Instrumented Interconnecteds Intelligent

Dan Lohrmann, Chief Security Officer, State of Michigan, and author of “BYOD for You”

Dan Lohrmann, Chief Security Officer, State of Michigan; author of “BYOD for You

By Dan Lohrmann

A radical change is sweeping across the global workplace: mobile technology is redefining the boundaries between work, home life and play.

According to IT analyst firm Gartner, the rise of bring your own device (BYOD) programs is the single most radical shift in the economics of client computing since the introduction of the personal computer in the workplace.

Bringing your own mobile device offers many benefits. Employees are comfortable with the various features and functionality of their preferred—and often beloved—smartphone. Also, using personally-owned mobile technology can eliminate the need for carrying two devices—one for personal use and the other for work.

How are you responding to this new trend? No doubt, there are significant challenges to securely and effectively implementing BYOD – as an enterprise or as an individual. Still, are you a leader, a follower, or are you part of the loyal opposition when it comes to radical shifts in the workplace?

My Journey to BYOD

Over the past 25 years, I’ve often been a naysayer when new technology emerged at the office. In fact, in my early days as a chief information technology officer in 2003, I almost lost my job fighting WiFi adoption.

Armed with plenty of stories of hackers and security white papers from three-letter agencies, I fought the initial implementation of wireless LANs in state and local government enterprises. Who would have thought that fast food restaurants and coffee shops would offer free WiFi around the world a decade later?

With the help of mentors, I learned important lessons that helped me to put cybersecurity into its proper role as a business enabler. When cloud computing challenges emerged a few years ago, Michigan became one of the first states to offer secure cloud alternatives.

Today, I believe that BYOD is the new WiFi. Security and privacy leaders need to engage and lead BYOD planning efforts in order to ensure that the needed protections are in place.

Where to Start?

In BYOD for You: The Guide to Bring Your Own Device to Work, I attempt to answer the question: How can end users be smart with BYOD?

The journey starts by categorizing your current situation which should be based on your employer’s approach to items such as company policies, security, reimbursement, and the planning and use of mobile device management (MDM) software. I describe three common BYOD workplace scenarios as Gold (the strongest, most in-depth policy), Silver (some policy) and Bronze (limited or no policy) and use these categories to describe other factors affecting your BYOD experience.

For example, if your company has a strong BYOD policy, you are fully reimbursed for bringing your own device to work and your company deploys MDM software, you will probably use the Gold advice. On the other hand, if you do not receive any stipend for bringing your own device, your company has no BYOD policy and no MDM software is deployed, you should follow the Bronze advice.

Not all of you will fit perfectly into one of these three levels; in fact, you may fit into multiple categories. Still, try to determine your BYOD level as Gold, Silver or Bronze.

Defining Gold, Silver, Bronze

Consider these examples to help determine which category suits your situation: 

Gold: 

  • Work Policy: BYOD policy
  • Security Policy Enforcement: Strong
  • Mobile Device Management (MDM): Yes
  • Smartphone Monthly Cost Reimbursement: Good
  • Use of Own Device for Daily Work: Extensive (most online activities)

Silver: 

  • Work Policy: Some policy applies
  • Security Policy Enforcement: Varies
  • Mobile Device Management (MDM): Minimal, may sync w/ Microsoft Exchange
  • Smartphone Monthly Cost Reimbursement: Partial, sometimes
  • Use of Own Device for Daily Work: Mixed (email, browsing, several apps

Bronze: 

  • Work Policy: No BYOD policy
  • Security Policy Enforcement: Varies
  • Mobile Device Management (MDM): None for personal devices
  • Smartphone Monthly Cost Reimbursement: None
  • Use of Own Device for Daily Work: Generally light (email only)

Evolving BYOD Landscape

Regardless of current limitations, the good news is that technical capabilities and innovative solutions will constantly change your environment and options. So, just because you are in the Bronze category now, doesn’t mean you’ll be there next year, or even next month.

Don’t be hesitant to suggest to management that the company needs a BYOD policy update. The goal is to maximize your BYOD benefits within the boundaries of your company’s rules, but understand that your suggestions to move to a higher level (Silver or Gold) could benefit both parties.

Bottom line – well-meaning professionals are taking risks by ignoring this trend. You can be an enabler of BYOD solutions and benefit your career at the same time. Learn more at byod4u.com

 _____________________________________________________________________

Dan J. Lohrmann is an internationally recognized security leader, technologist and author. He is best known for his refreshingly practical commentary on technology and clear advice on computer security and ethics for home and work.

As Michigan CSO & Deputy Director for Cybersecurity & Infrastructure Protection (CIP), he leads the Michigan Cyber Initiative, which was launched by Governor Snyder at the 2011 Michigan Cyber Summit. Dan is also a lead on several federal Department of Homeland Security (DHS) committees and National Governors Association (NGA) efforts in cybersecurity.

 

Bookmark and Share

Previous post

Next post

15 Comments
 
April 27, 2014
12:08 am

Excellent post. I certainly appreciate this site. Stick with it!
https://archive.org/details/celebritieswithsextapes


Posted by: celebrities with sex tapes
 
March 2, 2014
10:51 am

I think this is among the most vital information for me. And i’m glad reading your article. But wanna remark on few general things, The site style is perfect, the articles is really nice : D. Good job, cheers


Posted by: Stephen Cutolo
 
February 12, 2014
2:58 am

This recommendations techniques as well as info here is very important. I have been coached many ideas.


Posted by: SWC SECURITY
 
January 26, 2014
8:22 pm

Hmm it seems like your blog ate my first comment (it was super long) so
I guess I’ll just sum it up what I submitted and say, I’m thoroughly enjoying your blog.
I as well am an aspiring blog writer but I’m still new to everything.
Do you have any points for inexperienced blog writers?
I’d genuinely appreciate it.


Posted by: Jayson
 
December 24, 2013
3:06 am

This web site can be a stroll-through for all the information you needed about this and didn�t know who to ask. Glimpse right here, and also you�ll undoubtedly uncover it.


Posted by: Cordell Piroso
 
December 23, 2013
3:04 am

This is the proper blog for anyone who needs to seek out out about this topic. You understand so much its virtually hard to argue with you (not that I truly would wantHaHa). You undoubtedly put a new spin on a topic thats been written about for years. Great stuff, just great!


Posted by: Willow Hoskyns
 
December 21, 2013
3:06 am

That is the best weblog for anybody who needs to seek out out about this topic. You understand a lot its virtually exhausting to argue with you (not that I truly would needHaHa). You undoubtedly put a brand new spin on a subject thats been written about for years. Nice stuff, simply nice!


Posted by: Tania Brahler
 
December 18, 2013
8:27 am

When I originally commented I clicked the -Notify me when new comments are added- checkbox and now each time a comment is added I get four emails with the same comment. Is there any manner you possibly can remove me from that service? Thanks!


Posted by: Shane Laude
 
October 25, 2013
9:21 pm

coach シグネチャー バッグ コーチ バッグ アウトレット メンズ http://www.sztianfeng.com/トートバッグ-krxzlo8-5.html/


Posted by: コーチ バッグ アウトレット メンズ
 
September 12, 2013
1:25 pm

The dangers of the BYOD program is that business information can more easily be stolen off of mobile devices, which probably aren’t as secure as your company’s internal IT system. How can you monitor what is being downloaded onto those devices (even seemingly harmless things like games) so you know when your information is at risk, while still giving employees their privacy?


Posted by: Jessica Dodson
 
August 15, 2013
6:29 am

You can definitely see your skills within the paintings you write. The world hopes for more passionate writers like you who are not afraid to mention how they believe. At all times go after your heart.


Posted by: jewelry store
 
July 31, 2013
3:21 pm

The suggestions strategies and information at this site is especially invaluable. I have been taught a lot of pointers.


Posted by: garden clippers
 
July 29, 2013
7:58 am

You made some respectable points there. I looked on the internet for the difficulty and found most individuals will go together with together with your website.


Posted by: Cory Errera
 
July 3, 2013
11:42 am

Very informative article. Are there any resources where I can research which MDM software is best suited for different companies?


Posted by: Raymond
 
June 28, 2013
7:34 am

The growing mobility of the workforce, BYOD and Consumerization of IT have combined to create major challenges for IT staff. How do they secure sensitive data? How do they manage all those different types of devices? How do they connect employees and their devices with corporate applications?

One strategy for meeting these challenges is to separate data and applications from the end user devices. This can also be achieved with a combination of virtualization and HTML5 technologies. For example, data and applications can be securely hosted on VDI virtual desktops or on Microsoft RDS (Terminal Server) while mobile employees access those applications and desktops using HTML5-compatible browsers.

That’s the idea behind solutions like Ericom AccessNow, an HTML5 RDP client that enables access to Windows applications and desktops from a browser. Basing access on the browser allows employees to get to their applications and data from Android tablets and phones, iPads, iPhones and other devices.

Visit http://www.ericom.com/BYOD_Workplace.asp?URL_ID=708 for more info.

Please note that I work for Ericom


Posted by: Adam
 
2 Trackbacks
 
July 10, 2013
6:01 pm

[...] their money into their greatest needs. As one independent trend on the rise, Bring Your Own Device (BYOD) policies are a great solution for SMBs who need their employees to function with some independence [...]


Posted by: Magic Quadrant on Mobile Trends | Leonard-McDowell
 
Post a Comment