Read Part 1 here
Security pros are concerned – particularly in our age of consumerization – that as more businesses examine consumer devices and BYOD/BYOC (Bring Your Own Device/Computer), many aren’t using the same rigor as when they were using desktops and laptops. There’s a more significant trust level than before, and it’s unfounded.
“I’m somewhat on the fence... we all know it’s going to happen... it’s a question of when organizations embrace it,” said Bruce Michelson, distinguished technologist at HP
and the author of a book on lifecycle planning
. “They need to bring the infrastructure in the back end to absorb BYOD.”
Another point is that consumerization forces businesses to enter other lifecycle operations.
“When a customer is looking at a BYOD or consumer model, I ask if they’re going to be operating more services,” said Michelson. “For example we know identity theft is a huge problem. Should we not be offering that protection? If somebody’s identity is stolen the thief can enter the organization.”