Regulated environment key to successful BYOD: Security expert

27.04.2012
Controls, such as restricted network access, should be in place before allowing staff to bring their own devices if organisations want to avoid the risk of data leakage, says ACT government IT security senior manager, Peter Major.

Major told Computerworld Australia that information on tablets and smartphones could be easily compromised if the device was lost and accessed by someone with malicious intent.

"You also have the problem of data integrity. If they're processing the information on a tablet and uploading it into an environment that is not controlled by an application or interface, then you end up with a chance of polluting your data pool," Major said.

He said there's a bring-your-own-device (BYOD) "tsunami" coming as baby boomers are retiring and Gen X/ Y workers want the flexibility to work when and where they please.

"Once people know what they are signing up for, and the conditions, then they will tend to work within the BYOD environment," Major said. "When it comes to BYOD, do a threat and risk assessment, work out your cost models and move ahead in a phased manner."

However, Major said if IT managers do not have a BYOD policy in place then they risked alienating workers. "The company will become an employer of lest choice and people will simply move away," he said.