Week 8: Bring Your Own Device Policies and Users


Bring your own device policies are another area of information technology where security professionals can find their best intentions stymied by users’ attempts to work around policies that don’t consider the user experience first. This came up in conversation with a classmate recently, and there are two primary cases where users circumvent BYOD policies. First, due to a shortage of resources users may not have access to organization-provided mobile devices. Second, users may prefer using their own devices because the organization’s provided devices are old, have an interface the user is unfamiliar with, or are inconvenient to carry or use. The latter case played out in the most recent US Presidential election, with one candidate’s use of her personal IT system rather than the approved government system during her time as Secretary of State becoming a major campaign issue. While most of us don’t need to worry about this level of exposure, either scenario can easily inspire users to use their own mobile devices for work despite the absence of organizational approval.

What, then, should we in the information security profession do about this tendency? Organizations should implement BYOD policies that support the widest practical range of user choices while still protecting the organization’s security. When security dictates a more restrictive or non-permissive BYOD policy, organizations should ensure that as many users as possible have access to organization-provided mobile devices and make those devices as capable as possible. Both strategies seek to secure the network while at the same time keeping the user experience at the center of the decision-making process—and thereby encouraging users to follow the policies rather than finding ways around them.

Comments

Popular posts from this blog

Week 1: What is User-Centered Security?

Week 9: Selling Security Education, Training and Awareness Programs to Users