Are you ready for BYOD 2.0?

Share this article:
Are you ready for BYOD 2.0?
Are you ready for BYOD 2.0?

We've all become used to the acronym BYOD – or bring-your-own-device. However, with many organizations still struggling to allow employees to use personal devices in the workplace, they also now have to start thinking about the next challenge – BYOD 2.0!

This phenomenon sees applications designed for consumers finding their way into the corporate tool box. These services – such as Dropbox, Skype, Google Apps, WordPress, GoToMyPC – all were originally designed for the consumer market, but are being adopted by the workforce to simplify collaboration and improve flexibility.

The main issue is that these apps were not designed to be used in a corporate environment. As well as presenting potential scaling issues, their critical flaw is that security is often an afterthought rather than a primary consideration. For example, many of these apps, particularly the free versions, are protected purely by a password – and we all know how insecure that can be. Automated password-cracking software can perform 100 million checks per second – equating to a four-character password being cracked in 0.16 seconds, a six-character password in 11.4 minutes, and an eight-character password in just 32 days. 

If you think the potential damage is limited, think again. Many high-profile individuals have had their Twitter accounts hijacked, resulting in abusive tweets to followers. Dropbox too has been hacked, exposing all manner of secrets.

The long and short of it is: If you want some type of external connection application to work in an enterprise environment, then you are duty bound to add a decent level of security.

Share this article:
You must be a registered member of SC Magazine to post a comment.

Sign up to our newsletters

TOP COMMENTS

More in Opinions

Beware of the malware walking dead

Beware of the malware walking dead

This Hallows Eve might be a good time to remind ourselves that zombies can be just as deadly, and I'm referring to recycled tools and techniques from years gone by.

Why the Home Depot attack shouldn't have happened

Why the Home Depot attack shouldn't have happened

Major retailers are falling prey to massive credit card information heists, despite spending millions on cyber security systems.

Next-generation malware: Think like the enemy and avoid the car alarm problem

Next-generation malware: Think like the enemy and avoid ...

When it comes to enterprise security, one rule remains constant - attacks will continue to increase in sophistication and attackers will seek to outmaneuver existing defenses.