ROGUE APP DOWNLOADS and weak passwords should be considered by firms as employees breaching the company security policy, in order to ensure mobile devices are protected.
According to Kevin Curran, IEEE senior member and senior lecturer in Computer Science at the University of Ulster, every time an employee downloads a rogue app or uses a weak password, they are in effect breaching the security policy.
Curran advises that "a good security policy would define a security incident as any attempt to gain unauthorised access to the network, or denial of service, or the unauthorised use of a system for the processing of data or modification of hardware, firmware, software without the owner's knowledge".
But on the other side of the BYOD debate, Martin King, head of IT services at Ealing, Hammersmith and West London College, highlighted a real-world example of where mobile has to take precedence over security concerns.
"During this debate I am dealing with a pretty serious problem with our Microsoft enterprise system (Active Directory) that Microsoft itself was initially unable to fix," King noted.
"While enterprise users are experiencing quite some difficulty in continuing their work on corporate-joined systems, BYOX [X for extreme] users are able to continue working fine. The diversity of BYOX is a distinct advantage in survival."
The INQUIRER is running its latest debate this week, where we're putting two industry experts head to head to argue whether the rise of the mobile will override security concerns, or whether protection should trump proliferation of user devices.
On Tuesday, Ben Tizer, UK sales director at MaaS360 by Fiberlink, IBM, joined the Mobile versus Security debate to offer his views on how to separate caution from cowardice when it comes to BYOD.
Ben also argued that the D in BYOD no longer stands for devices, it's data.
On Monday, we were joined by Martin and Kevin to discuss: Does the rise of BYOD and mobile devices mean we lose control of security?
Do you agree with Martin that mobile is the dominant force, and security has to be tailored to it? Or do you think Kevin is right, that security should be first and foremost?
You can post your thoughts and cast your vote for Martin or Kevin at our debate website. µ
Someone could be in for a NASty surpise
An assault course on the senses
Boasting Bionic boosting