{"id":22814,"date":"2023-08-31T04:30:15","date_gmt":"2023-08-31T12:30:15","guid":{"rendered":"https:\/\/www.palada.net\/index.php\/2023\/08\/31\/news-16544\/"},"modified":"2023-08-31T04:30:15","modified_gmt":"2023-08-31T12:30:15","slug":"news-16544","status":"publish","type":"post","link":"http:\/\/www.palada.net\/index.php\/2023\/08\/31\/news-16544\/","title":{"rendered":"With BYOD comes responsibility \u2014 and many firms aren&#039;t delivering"},"content":{"rendered":"<p><img decoding=\"async\" src=\"https:\/\/images.idgesg.net\/images\/article\/2020\/09\/red_flag_warning_button_alert_danger_disaster_by_matejmo_gettyimages-644328002_2400x1600-100858026-small.jpg\"\/><\/p>\n<p>Apple deployments are <a href=\"https:\/\/www.computerworld.com\/article\/3705669\/idc-sees-big-enterprise-shift-to-macs-over-next-12-months.html\">accelerating\u00a0across the global enterprise<\/a>, so it\u2019s surprising that many organizations don&#8217;t properly recognize that change. Even when companies put Macs, iPhones, and iPads in the hands of their employees, they are failing to manage these deployments. It\u2019s quite shocking.<\/p>\n<p>That\u2019s the biggest take-away from the latest <a href=\"https:\/\/www.jamf.com\/\" rel=\"noopener nofollow\" target=\"_blank\">Jamf\u00a0research<\/a>, which warns that almost half of enterprises across Europe still don\u2019t have a formal Bring-Your-Own-Device (BYOD) policy in place. That\u2019s bad, as it means companies have no control over how employees connect and use corporate resources, creating a nice, soft attack surface for criminals and competitors alike.<\/p>\n<p>There were additional findings that should be considered by any enterprise allowing employee devices to access corporate resources, particularly as most businesses are quickly embracing hybrid tech infrastructure.<\/p>\n<p>They reveal increased security challenges, fading budgets and a large amount of duplication and inefficiency in the existing systems for device management.<\/p>\n<p>Jamf surveyed more than 100 organizations attending events it held across Europe to get to these conclusions. Almost half (43%) of those surveyed felt that they face more compliance-based security concerns this year versus last year, even as 53% of enterprises seek to cut security\/IT costs.<\/p>\n<p>One way they may be able to cut costs might be to do a better job of harmonizing existing contracts. It looks like two-thirds (67%) of enterprises use up to five separate vendors for management and security across all device types. Not only that, but there seems to be some weird divide between organizational departments, with 57% of them having separate teams to handle device management and security.<\/p>\n<p>In the context of today\u2019s hybrid workplace and multiple devices and operating systems, it\u2019s hard to see why some business users impose that difference \u2014 it\u2019s a hangover from a less integrated era of IT.<\/p>\n<p>As an aside, I spoke with <a href=\"https:\/\/www.applemust.com\/jamf-ceo-dean-hager-announces-retirement-transition-plan\/\" rel=\"nofollow\">outgoing\u00a0Jamf CEO Dean Hager recently<\/a>, who explained how device management has evolved. \u201cThe reason you&#8217;re buying all this stuff is to make sure that you have trusted access. And none of the patchwork of solutions that existed at that time could do this alone,&#8221; <a href=\"https:\/\/www.computerworld.com\/article\/3703289\/windows-is-a-declining-ecosystem-jamf-ceo-says.html\" rel=\"noopener\" target=\"_blank\">he said<\/a>.<\/p>\n<p>BYOD schemes can save company cash, but the real benefit is seen in the productivity, loyalty, and commitment benefits unlocked <a href=\"https:\/\/www.computerworld.com\/article\/3649202\/employees-want-the-right-tools-for-work-so-let-them-choose.html\">when employees gain this kind of autonomy<\/a>. Still, in today\u2019s security environment there are risks that must be managed rather than ignored.<\/p>\n<p>It isn\u2019t really enough to rely on the legendary security benefits of Apple\u2019s platforms \u2013 Apple recognizes this, which is why it works so closely with security researchers to <a href=\"https:\/\/www.applemust.com\/apple-opens-up-iphone-security-research-device-applications\/\" rel=\"noopener nofollow\" target=\"_blank\">identify flaws in those systems<\/a>.<\/p>\n<p>It&#8217;s also why it developed a mechanism for <a href=\"https:\/\/www.computerworld.com\/article\/3701937\/apples-disappearing-rapid-security-response-update-u.html\">rapid security response to threats<\/a>. There is no such thing as 100% secure, which means enterprises that fail to consider security and device management leave themselves \u2014 and their partners \u2014 vulnerable to attack.<\/p>\n<p>In a statement, Michael Covington, Jamf&#8217;s vice president for portfolio strategy, said:<\/p>\n<p>\u201cWhile it is easy to get swept up in the positives surrounding &#8216;anywhere work&#8217; programs that empower employees to work remotely on their own schedule, from any location and from any device, organizations need to examine the associated risks and decide how to manage them.<\/p>\n<p>\u201cIt\u2019s important to have a clearly documented BYOD policy in place to take advantage of these benefits, but the good news is that the technologies are now available to effectively manage risk in these environments.\u201d<\/p>\n<p>No surprise Jamf makes such technologies, but the company warns business leaders that it isn\u2019t just enough to just begin using them; \u00a0the approach must be planned.<\/p>\n<p>Management must learn and share the benefits of these systems, make it crystal clear how data will be handled, and put protection in place to ensure personal data remains personal. Communication is critical here.<\/p>\n<p>It&#8217;s also critical in securing the inevitable weak point of any form of security protection \u2014 the users themselves. With that in mind, companies should invest in training staff in security awareness and encourage them to update devices as and when those updates appear.<\/p>\n<p>Companies should also set standards \u2014 and devices that don\u2019t meet those standards, in terms of security protection, should not gain access to corporate systems. This is all <a href=\"https:\/\/www.computerworld.com\/article\/3703055\/apple-proposed-uk-law-is-a-serious-direct-threat-to-security-privacy.html\">common sense stuff<\/a>, really. We know the security environment is <a href=\"https:\/\/www.computerworld.com\/article\/3701937\/apples-disappearing-rapid-security-response-update-u.html\">extremely challenging<\/a>\u00a0\u2014 even <a href=\"https:\/\/www.silicon.co.uk\/projects\/public-sector\/met-police-contractor-hack-527331\" rel=\"noopener nofollow\" target=\"_blank\">police forces are regularly hacked<\/a>.<\/p>\n<p>In that context, it makes total sense to think about how to manage the devices connected to your systems and to put in place the software, security, and user education it takes to protect your business environments. The cost of device management is relatively negligible compared to the consequences of a <a href=\"https:\/\/www.ibm.com\/reports\/data-breach\" rel=\"noopener nofollow\" target=\"_blank\">successful ransomware attack<\/a>, after all.<\/p>\n<p>With this in mind, it\u2019s surprising so many European \u2014 and, by inference, global \u2014 businesses seem so poorly protected.<\/p>\n<p><em>Please follow me on\u00a0<a href=\"https:\/\/social.vivaldi.net\/@jonnyevans\" rel=\"nofollow noopener\" target=\"_blank\">Mastodon<\/a>, or join me in the\u00a0<a href=\"https:\/\/mewe.com\/join\/appleholics_bar_and_grill\" rel=\"nofollow noopener\" target=\"_blank\">AppleHolic\u2019s bar &amp; grill<\/a>\u00a0and\u00a0<\/em><a href=\"https:\/\/mewe.com\/join\/apple_discussions\" rel=\"nofollow noopener\" target=\"_blank\"><em style=\"font-weight: inherit;\">Apple<\/em>\u00a0<em style=\"font-weight: inherit;\">Discussions<\/em><\/a><em>\u00a0groups on MeWe.<\/em><\/p>\n<p><a href=\"https:\/\/www.computerworld.com\/article\/3705988\/with-byod-comes-responsibility-and-many-firms-arent-delivering.html#tk.rss_security\" target=\"bwo\" >http:\/\/www.computerworld.com\/category\/security\/index.rss<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p><img decoding=\"async\" src=\"https:\/\/images.idgesg.net\/images\/article\/2020\/09\/red_flag_warning_button_alert_danger_disaster_by_matejmo_gettyimages-644328002_2400x1600-100858026-small.jpg\"\/><\/p>\n<article>\n<section class=\"page\">\n<p>Apple deployments are <a href=\"https:\/\/www.computerworld.com\/article\/3705669\/idc-sees-big-enterprise-shift-to-macs-over-next-12-months.html\">accelerating\u00a0across the global enterprise<\/a>, so it\u2019s surprising that many organizations don&#8217;t properly recognize that change. Even when companies put Macs, iPhones, and iPads in the hands of their employees, they are failing to manage these deployments. It\u2019s quite shocking.<\/p>\n<p>That\u2019s the biggest take-away from the latest <a href=\"https:\/\/www.jamf.com\/\" rel=\"noopener nofollow\" target=\"_blank\">Jamf\u00a0research<\/a>, which warns that almost half of enterprises across Europe still don\u2019t have a formal Bring-Your-Own-Device (BYOD) policy in place. That\u2019s bad, as it means companies have no control over how employees connect and use corporate resources, creating a nice, soft attack surface for criminals and competitors alike.<\/p>\n<p class=\"jumpTag\"><a href=\"\/article\/3705988\/with-byod-comes-responsibility-and-many-firms-arent-delivering.html#jump\">To read this article in full, please click here<\/a><\/p>\n<\/section>\n<\/article>\n","protected":false},"author":4,"featured_media":0,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"colormag_page_container_layout":"default_layout","colormag_page_sidebar_layout":"default_layout","footnotes":""},"categories":[11062,10643],"tags":[2211,24585,10554,12555,714,24580],"class_list":["post-22814","post","type-post","status-publish","format-standard","hentry","category-computerworld","category-independent","tag-apple","tag-enterprise-mobile-management","tag-mobile","tag-mobile-device-management","tag-security","tag-small-and-medium-business"],"_links":{"self":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts\/22814","targetHints":{"allow":["GET"]}}],"collection":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/users\/4"}],"replies":[{"embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/comments?post=22814"}],"version-history":[{"count":0,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts\/22814\/revisions"}],"wp:attachment":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/media?parent=22814"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/categories?post=22814"},{"taxonomy":"post_tag","embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/tags?post=22814"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}