IT | Security

Managing BYOD 2.0

By: Absolute Team | 4/9/2013

While not all organizations have caught up with the demands of BYOD, organizations also need to face the realities of data sharing using other apps and cloud services, which some are terming BYOD 2.0.

What is BYOD 2.0? According to Andy Kemshall for SC Magazine, it's about consumer-based cloud services and applications being used for enterprise purposes:

"This phenomenon sees applications designed for consumers finding their way into the corporate tool box. These services – such as Dropbox, Skype, Google Apps, WordPress, GoToMyPC – all were originally designed for the consumer market, but are being adopted by the workforce to simplify collaboration and improve flexibility."

These apps were not designed with corporate needs in mind, so security should not be taken for granted. With some of these apps only password protected, your data or your reputation could be at risk. How secure is your Twitter password, for example? Recent Twitter hijacking of brands has sparked concerns over this one area of BYOD 2.0 security issues.

Addressing BYOD 2.0 challenges requires a plan that incorporates both a shift in culture (the 'people' part of any policy) as well as supporting technology. Setting up access controls for social media accounts, covering the basics of password security, managing user access, setting up policies on cloud-based data sharing, and tracking the use of data to prevent the use of blacklisted devices or services.

As part of your data management plan, AbsoluteSafe, a feature of Absolute Manage, can provide protection and secure distribution of documents (PDF, office, etc.), eliminating the security risks associated with traditional document sharing apps and email. For more information about AbsoluteSafe read the datasheet here [PDF].