Computerworld - At a seminar last week in San Francisco on the impact of mobility on business, I asked for a show of hands to see how many of the attendees' companies have a policy governing the use of personal devices. Of the roughly 50 people in the audience, four raised their hands.
No one in the room, including me, was surprised. The lack of such policies in corporations is well documented. But what did surprise me was the depth and universality of frustration that IT pros are feeling with respect to trying to manage mobile devices.
One CIO talked about how he's bummed that vendors haven't done a better job of standardizing cell phone and handheld wares; another wondered how to devise a sustainable support model. And then there's the issue they're all fretting over, probably more than any other: security. Between lost data and the proliferation of spam and viruses targeting these devices, the threat seems to be overwhelming many CIOs.
The hand-wringing over security is only going to get worse, because personal devices are only going to get more ubiquitous. And as if cell phones and handhelds weren't enough to contend with, MP3 players are quickly being added to the cache of productivity arms in your users' arsenals.
That disquieting fact was underscored last week when Apple Computer's Steve Jobs said his company will support and organize podcasts -- downloadable audio files, typically of voice programming -- in the next versions of its iTunes and iPod software. The announcement didn't raise too many security alarms, but think about it. Podcasting is a convenient, inexpensive, reliable means of disseminating information to a global workforce. It's already gaining popularity as a vehicle for sharing the proceedings of meetings and conferences, and it's easy to imagine how it might be used for corporate training and vertical applications like distributing lecture materials in the education sector.
What that means is that MP3 players will eventually be standard equipment for your users. And when that time comes, the capacity for corporate data loss will be almost incomprehensible. Your networks and devices might be bulletproof, but there will be nothing to mitigate the insider security threat when your organization is inundated with what are essentially portable hard drives with exponentially growing storage capacities.
Fortunately, for many organizations there will be a silver lining in all this, because they'll no longer have to deal with the headache of supporting a PC on every desktop. Concern about the damage these devices can do will be the catalyst that finally makes server-based, thin-client computingcompelling enough for many CIOs to bite the bullet and make the switch.
Just last week, Hitachi cited security as the main reason for a plan to replace 16,000 internal PCs with thin clients over the next two years . True, Hitachi is in the business of selling thin-client systems, and its move is similar to what Sun Microsystems has done with the internal adoption of its Sun Ray thin clients.
There's unquestionably a marketing element involved, but it would be shortsighted to chalk the strategies up to gimmickry. These guys are on to something.
Don Tennant is editor in chief of Computerworld. You can contact him at email@example.com.
Read more about Security in Computerworld's Security Topic Center.
- Best iPhone, iPad Business Apps for 2014
- 14 Tech Conventions You Should Attend in 2014
- 10 Desktop Apps to Power Your Windows PC
- How to Add New Job Skills Without Going Back to School
- Slideshow: 7 security mistakes people make with their mobile device
- iOS vs. Android: Which is more secure?
- 11 sure signs you've been hacked
- The 12 PCI DSS 3.0 requirements addressed by Peer 1 Hosting This handy quick reference outlines the 12 PCI DSS 3.0 requirements, who needs to be compliant and how Alert Logic solutions address the...
- Defense Throughout the Vulnerability Life Cycle This whitepaper provides insight into how to leverage threat and log management technologies to protect your IT assets throughout their vulnerability life cycle.
- Alert Logic for PCI DSS Compliance To achieve PCI DSS compliance, you must identify and remediate all critical vulnerabilities detected during PCI scans. Threat Manager streamlines this process by...
- Cybersecurity Imperatives Reinvent Your Network Security With Palo Alto Networks The Rise of CyberSecurity
- Live Webcast On-demand webinar: "Mobility Mayhem: Balancing BYOD with Enterprise Security" Check out this on-demand webinar to hear Sophos senior security expert John Shier deep dive into how BYOD impacts your enterprise security strategy...
- Live Webcast Endpoint Backup & Restore: Protect Everyone, Everywhere Arek Sokol from the bleeding-edge IT team at Genentech/Roche explains how he leverages cross-platform enterprise endpoint backup in the public cloud as part...
- Streamline Software Asset Management, Compose a software Management Symphony Keeping track of your organization's software is easy with effective software management solutions from CDW. View the videos in our software solutions channel
- Druva inSync: Endpoint Data Protection & Governance CLICK HERE to watch this video about protecting corporate data on laptops and mobile devices, sponsored by Druva. All Security White Papers | Webcasts