What are BYOA and BYOD doing to the corporate landscape?

Are business ICT staff getting lazier?   What about Managed Services providers and outsourced ICT support, they are suppose to support your business with the best technology and technological changes?   In the every changing business environment what is the best thing for your business.   This has to be also tempered with the fact that some technologies will not be embraced by the business world and could lead the business into a technological cul-de-sac.

BYOD (bring your own device) and BYOA (bring your own applications) are changing the business landscapes in unpredictable ways.   The one constant and overriding requirement is to make sure that a business does not expose its digital footprint to the rest of the world.   This requirement has to also be tempered with usability and convenience.   It is a very fine line to tread in the business world.

BYOA are the most unpredictable component of the bring your own concept.   These applications can be given full access to business databases, salesforce is a classic example of this, thus allowing anyone with access to the device full access to your business systems.   Applications that run on smart phones and tablets that access corporate data have significant cybersecurity implications.

In the rush to get applications to market, security is the last thing that is thought through.   A case in point is the click frenzy website, not a true application but the newest in a long line of software failures.   In the rush to meet deadlines, critical database files were left both unencrypted but also plainly visible.   They are not the first and will not be the last to forget that hardening, security testing and penetration testing an application is also a part of the final release.

BYOD and BYOA are here to stay.   They are the way of the future along with working from home and telecommuting.   This is going to put more stress on ICT support for all businesses no mater what the size and the area of focus.   Tablets are being used in manufacturing, news gathering, medical and accounting.    For better or worse, they are here to stay so the ICT departments have to incorporate them into their ICT plans.

Roger Smith, is an educator. Teaching students at ADFA (UNSW) and showing them how vulnerable they are to cybercrime.

He is also CEO at R & I ICT Consulting Services Pty Ltd, an Amazon #1 author on Cybercrime and founder of the SME Security Framework. He is a Consultant who specialises in inexpensive and highly effective security strategies for small and medium businesses and not for profit organisations.

He has developed and authored the SME Security Framework and the Security Policy Training Course which are considered to be the definitive guides to helping SME's protect their organisation using the principles of Technology, Management, Adaptability and Compliance.