Are you ready for BYOD 2.0?

Share this article:
Are you ready for BYOD 2.0?
Are you ready for BYOD 2.0?

We've all become used to the acronym BYOD – or bring-your-own-device. However, with many organizations still struggling to allow employees to use personal devices in the workplace, they also now have to start thinking about the next challenge – BYOD 2.0!

This phenomenon sees applications designed for consumers finding their way into the corporate tool box. These services – such as Dropbox, Skype, Google Apps, WordPress, GoToMyPC – all were originally designed for the consumer market, but are being adopted by the workforce to simplify collaboration and improve flexibility.

The main issue is that these apps were not designed to be used in a corporate environment. As well as presenting potential scaling issues, their critical flaw is that security is often an afterthought rather than a primary consideration. For example, many of these apps, particularly the free versions, are protected purely by a password – and we all know how insecure that can be. Automated password-cracking software can perform 100 million checks per second – equating to a four-character password being cracked in 0.16 seconds, a six-character password in 11.4 minutes, and an eight-character password in just 32 days. 

If you think the potential damage is limited, think again. Many high-profile individuals have had their Twitter accounts hijacked, resulting in abusive tweets to followers. Dropbox too has been hacked, exposing all manner of secrets.

The long and short of it is: If you want some type of external connection application to work in an enterprise environment, then you are duty bound to add a decent level of security.

Share this article:

Sign up to our newsletters

More in Opinions

The cool factor: New tech in banking has an edge

The cool factor: New tech in banking has ...

Disruption is expected; financial crime should be, too.

Me and my job: James Hill senior security architect, Consolidated Data Services

Me and my job: James Hill senior security ...

James Hill senior security architect, Consolidated Data Services (CDS), discusses his role at his organization.

Ahead in the cloud

Ahead in the cloud

Growth businesses are always looking for flexible ways of working that reduce capital and running costs, while securely delivering the data users need, when and where they need it.