The chances are that you probably should be concerned enough about the BYOD problem to protect yourself from it –if only you knew what it was! So, let’s explain that part first.
The Meaning Of BYOD
B –bring
Y – your
O –own
D – device
Maybe, everything is not yet crystal clear? We are in the realms of computers and, in particular, computers with some sort of ability to communicate with other computers. This could be by way of a wired connection or any of the wireless connectivity methods currently available. Also, the computer need not necessarily be a full sized desk or lap top. In the context of BYOD, all sorts of smart phones and tablets should be included in the list of things to treat with caution.
The point is that any type of device with connectivity abilities can be used to gain access to other devices. Usually, we do this deliberately; we connect directly with other computers and network them together so that they can share data; or, we connect ourselves to what we call the internet to access data from a worldwide collection of computers that we aren’t really aware of but take for granted.
Why Be Cautious?
Everything is fine when your office desktop is connected to those of your co-workers or your laptop is connected to your own desktop. These, like many other examples are connections made between people who should be able to fully trust each other. But, what happens when another person brings in a device of their own and hooks into your “friendly” network? Can they be trusted not to abuse the connection for their own ends? Likewise, if a trusted employee on the company network brings in a connectivity ready device that no one else in the company knows about? Who knows what the intentions are for this BYOD? The “bringer” could be totally innocent of any ill intent; or, could be hoping to gain access to confidential information held in the computers he hopes to clandestinely connect to.
Best To Apply BYOD Security
Passwords and firewalls provide some security but these might not be totally secure; developers have come up with extra levels of security so that security appliance of BYOD can be as simple as purchasing and installing special sensors that are constantly on the lookout for any unexpected devices operating in the vicinity and the associated software gives you adequate warning so that you can take action to avoid possible risk.