Striking a Balance: BYOD in the Corporation

By Bruce Harmon, Ph.D., Doctoral Chair of Computer Science

CTU Computer Science Degree - Bring your own device - iphoneI’m writing this post from the Next Generation Security Summit (NGSS) in Austin, TX. The event brings together about 100 senior executives, in particular the chief information security officers (CISOs), from corporations around the country. Are you curious to know the #1 priority on their minds? CISOs want to know how the proliferation of mobile devices impacts security and compliance. More specifically, how should organizations manage the Bring Your Own Device (BYOD) issue? 

Companies are faced with a tough situation. One the one hand, they have a sincere interest in their employees’ right to use mobile devices. But on the other hand, organizations are responsible for protecting the integrity and privacy of their data, which means compliance with the law and applicable regulations, as well as the use of simple common sense. So while employees wish to fully exploit the power and convenience of these devices, companies wonder if denying access is the right solution. Fortunately, most companies want to do better than that.

At this stage of industry maturity, most companies that are not subject to the extreme security and regulatory requirements you might find when contracting with the Department of Defense, for instance, are making plans to handle security. In the meantime, employee-wide mobile device use is acceptable – for now. As a result, there are no established processes preventing remote access to sensitive data at the fingertips of employees. If an employee downloads private information to a mobile device that is stolen, then that sensitive data is vulnerable. While this occurrence isn’t materially different than downloading the same data to a home computer or laptop, the portability of a mobile device creates far greater exposure for the company.

Thus, organizations that permit BYOD access to corporate data are recognizing this exposure and are looking for ways to mitigate the risk involved. One interesting idea presented at NGSS was the notion of partitioning the data space of the mobile device, enabling data downloaded from company servers to be held in a separate, encrypted and password-protected area.

At this point in the game, CISOs are aware of the issue, and that’s a great first step. Next, will come creative solutions that will more fully develop as mobile devices continue to gain traction. It will be interesting to see how the balance between availability and security evolves over time. I’m curiously following as security and compliance issues inherent in BYODs are addressed with new technologies, and I’ll be share to them with you as it all unfolds.

CTU Faculty - Bruce HarmonBruce Harmon, Ph.D., is the Doctoral Chair of Computer Science at Colorado Technical University. He earned a Ph.D. in Electrical Engineering with a minor in Computer Science from the University of Colorado and his M.S. in Aeronautical Engineering from Purdue University. After 9 years in the Air Force, he worked in defense and later at top-tier commercial companies for 17 years both in research and executive leadership positions. Learn why he’s IN.

Stay in the know! Subscribe to CTU’s blog and receive fresh updates directly to your inbox. Join us!

Image credit: Flickr/Maaco

Copyright © 2016 Colorado Technical University (CTU). All rights reserved. No information may be duplicated without CTU's permission. The CTU logo is a registered trademark of Career Education Corporation. CTU cannot guarantee employment or salary. Not all programs are available to residents of all states. Programs vary by location and modality; see catalog for details. Financial aid is available for those who qualify. See the Accreditation & Licensure section for information on the agencies that approve and regulate the school's programs, including relevant complaint procedures here. Find employment rates, financial obligations and other disclosures below.

Privacy Statement Legal Terms and Conditions Student Disclosures Sitemap Student Safety Contact Us

 (855) 230-0555

Terms and Conditions By providing your mobile number, you agree to receive text messages from Colorado Tech via its mobile text message provider.  You may opt out of receiving messages by texting the word STOP to 94576, or simply reply with the word STOP to any text message you receive from Colorado Tech. While CEC or its mobile text message provider will not charge end users for receiving/responding to promotional messages, depending on the terms of your mobile phone plan, you may incur a cost from your mobile service carrier to receive and respond to any promotional text messages (standard messaging and data rates/fees and other charges may apply).  Charges will appear on your mobile phone bill or will be deducted from pre-paid amounts.  Current participating/supported carriers are: Alltel, AT&T, Boost, Cellcom, Cellular One, Cellular South, Cincinnati Bell, Cricket, Element Wireless, Golden State Cellular, iWireless, Metro PCS, Nextel, nTelos, Plateau Wireless, Sprint, T-Mobile, US Cellular, Verizon Wireless, Viaero Wireless, Virgin, and more.×