THE DARK WEB and the Apple Watch are two big reasons why businesses need to put in place BYOD security policies, if they don't already have one.
In case you haven't noticed, we've been running a mobile versus security debate this week on The INQUIRER, where two industry experts have gone head to head to argue whether the rise of the mobile will override security concerns, or whether protection should trump proliferation of user devices.
Fighting the mobile corner has been Martin King, head of IT services at Ealing, Hammersmith and West London College, who today regaled us with an array of acronyms applicable to the mobile movement: CLEO, MBYOD, CYOD, SYOD, COPE, BYOX. Answers on a postcard please for guesses on what these all stand for, or just head over to the debate site where all is revealed.
King also noted that the launch of the Apple Watch this week, which is set to drive wearables into the enterprise, adds another aspect to the BYOD security challenge.
In the security corner, we have Kevin Curran, IEEE senior member and senior lecturer in Computer Science at the University of Ulster. Curran explained that as he gets sight of the tools on the Dark Web, which are becoming easier to obtain and use, he will continue to be the 'voice in the wilderness' warning of all the security risks out there via mobile devices at work.
"Of course, I always run the risk of being seen as paranoid," he quipped.
However, even paranoia isn't always enough when it comes to trying to protect corporate networks from mobile access. Debate commenter Fipperson gave a worrying example of his organisation, which allows access to email through a private mobile phone.
"They specify a five-digit login PIN has to be set, but it's a royal PITA as every time you want to use your own phone you have to go through the company-specified PIN procedure. So we all circumvent the security policy by rooting and installing a tampered version of the email app. Huge security risk but brought on by the company not consulting with the end users," he explained.
On Tuesday, Ben Tizer, (pictured right) UK sales director at MaaS360 by Fiberlink, IBM, joined the Mobile versus Security debate to offer his views on how to separate caution from cowardice when it comes to BYOD.
Ben also argued that the D in BYOD no longer stands for devices, it's data.
On Monday, we were joined by Martin and Kevin to discuss: Does the rise of BYOD and mobile devices mean we lose control of security?
Do you agree with Martin that mobile is the dominant force, and security has to be tailored to it? Or do you think Kevin is right, that security should be first and foremost?
You can post your thoughts and cast your vote for Martin or Kevin at our debate website. µ
Someone could be in for a NASty surpise
An assault course on the senses
Boasting Bionic boosting