

So, in 2015, I believe that many businesses that have BYOD policies will scrap them altogether.

“Attention employees! Give us all of your personal smartphones for 36 hours so that we can test their security!” Yeah, that will go over well. It also makes it far too complicated to thoroughly run a penetration test and security harden an office's network when so many employees' own devices get connected to it. Remote find, lock, and wipe aren't enough,” said Mark Bermingham of Kaspersky Lab. “As consumers and businesses shift to using mobile devices for a greater percentage of their daily activities, cybercriminals will place a larger emphasis on targeting these platforms - specifically Android and jailbroken iOS devices. The app payment, banking, and NFC payment examples I cited are examples of how sensitive personal financial data may be on employees' personal phones and tablets.Īlso, mobile malware is an ever increasing risk.

Businesses will often allow BYOD (bring your own device), thinking that it'll increase productivity and save them money by not having to purchase mobile devices for their employees.īut BYOD introduces a multitude of security problems to corporate networks, even when they don't contain a business's sensitive data. Many of them even use their phones to pay for stuff in malls and restaurants, thanks to NFC payment apps such as Google Wallet and Apple Pay. BYOD R.I.P.?Īs personal and business smartphone usage has exploded since about 2007, people who work in office environments carry their work home with them on the same devices they use to watch cat videos on YouTube, empty their wallets with Candy Crush Saga, and conduct their personal banking. Are corporations and institutions going to get smarter about it? In the rapid pace of tech, how will endpoint security implementation evolve in 2015? From my keen observations of what's going on in the IT world, here's what I predict. A lot of these problems can be prevented with a solid endpoint security strategy.
