Week 8: Bring Your Own Device Policies and Users
Bring your own device policies are another area
of information technology where security professionals can find their best
intentions stymied by users’ attempts to work around policies that don’t
consider the user experience first. This came up in conversation with a
classmate recently, and there are two primary cases where users circumvent BYOD
policies. First, due to a shortage of resources users may not have access to
organization-provided mobile devices. Second, users may prefer using their own
devices because the organization’s provided devices are old, have an interface
the user is unfamiliar with, or are inconvenient to carry or use. The latter
case played out in the most recent US Presidential election, with one candidate’s
use of her personal IT system rather than the approved government system during
her time as Secretary of State becoming a major campaign issue. While most of
us don’t need to worry about this level of exposure, either scenario can easily
inspire users to use their own mobile devices for work despite the absence of
organizational approval.
What, then, should we in the information
security profession do about this tendency? Organizations should implement BYOD
policies that support the widest practical range of user choices while still protecting
the organization’s security. When security dictates a more restrictive or
non-permissive BYOD policy, organizations should ensure that as many users as
possible have access to organization-provided mobile devices and make those
devices as capable as possible. Both strategies seek to secure the network
while at the same time keeping the user experience at the center of the
decision-making process—and thereby encouraging users to follow the policies
rather than finding ways around them.
Comments
Post a Comment