New security threat at work: Bring-your-own-network
Education and contracts with employees can help curb security risks
Computerworld - Even as IT pros wrestle with the bring-your-own-device (BYOD) trend, corporate security is being further complicated by another emerging trend: bring your own network (BYON).
BYON is a by-product of increasingly common technology that allows users to create their own mobile networks, usually through mobile wireless hotspots. Security professionals say BYON requires a new approach to security because some internal networks may now be as insecure as consumer devices.
Jim Kunick, an attorney with the Chicago law firm Much Shelist, said BYON represents a more dangerous threat to data security than employees who bring their own smartphones or tablets into the office. "The network thing blows this up completely, because it takes the data out of the network the company protects," he said. "There's no way to ensure the security of that data. People are running corporate apps and processing corporate and client data using networks that may or may not be secure.
"I mean, no one is sure the Boingo network is secure," he said.
Kunick, an intellectual property attorney, said BYON is cropping up in start-ups, particularly at software development firms and entities that rely on cloud services.
"[BYON] allows people to run applications in three different cloud-based environments at one time because they're on their own network, they're on a network that they contracted with and they're on the corporate network," he said.
Initially, BYON should be seen as a policy issue where a company sets rules that ban employees from running private networks. Employees who use hotspots also have contracts with network service providers, he said, and they need to understand how data on that network may be used or further disclosed.
"In any major corporation, I'd assume they control [access] by means of a firewall. And, I have a medical device client [corporation] that encrypts all of their corporate data so you can't even bring your own device into the company," Kunick said. "You have to use a laptop that they provide. So it's without question that you can't bring your own network in."
Ted Schadler, a vice president and principal analyst at Forrester Research, said there are even some companies that ask wireless service providers to move their towers.
"I'm aware of certain companies, such as large call centers, asking AT&T and Verizon to move their cell towers from around their buildings because they're so concerned about unsupervised workers," he said. "It just exacerbates the challenges."
Schadler, who spoke at the Consumerization of IT in the Enterprise (CITE) Conference in New York City this week, said that in terms of physical security, there is little companies can do to avert data being shared over hotspot network links.
Steve Damadeo, IT Operations Manager Festo Corp., a producer of pneumatic and electric drive technology, said his first approach with employees who want to use personal technology at work is to educate them. "We try to spend a lot of time talking to employees about why it's important to make sure when you're inside our environment that you're using corporate secure resources," he said.
Festo hasn't used wireless jamming or blocking technology because it is trying to keep wireless communications as open as possible.
Like many enterprises, Festo has multiple secure wireless networks, three of which its employees can access. The company's primary wireless network is used for access to internal systems and data via authorized mobile devices; users of it are managed via custom-built mobile device management software.
A second network is offered to employees who want connectivity to the World Wide Web via their own mobile devices; that one allows access through a VPN. "We've not enabled full BYOD within the company, so at this point we're able to provide VPN capabilities to them," Damadeo said.
The third wireless network is for guests, and it is made available on a rotating encryption/key basis for visitors.
One other method of controlling how employees use wireless communications is to have them sign contracts, so that they understand they, too, are responsible for any lost data, Schadler said.
They're "basically requiring employees sign their life away and indemnify the company against damages, and that makes them think twice," he said.
Lucas Mearian covers storage, disaster recovery and business continuity, financial services infrastructure and health care IT for Computerworld. Follow Lucas on Twitter at @lucasmearian or subscribe to Lucas's RSS feed . His e-mail address is firstname.lastname@example.org.
Consumerization of IT
- With BYOD smartphones on the rise, IT headaches will become migraines
- Apple plays defense and offense with free software, upgrade strategies
- The three extremes of corporate BYOD policies
- IT departments won't exist in five years
- The time is right for an 'IT petting zoo'
- The next corporate revolution will be power to the peons
- Dual persona smartphones non grata at Starz
- Google Glass breaks into business
- BYOD, or else. Companies will soon require that workers use their own smartphone on the job
- 'Dual personality' could morph into Jekyll and Hyde for Samsung and BlackBerry
Read more about Consumerization of IT in Computerworld's Consumerization of IT Topic Center.
- 15 Non-Certified IT Skills Growing in Demand
- How 19 Tech Titans Target Healthcare
- Twitter Suffering From Growing Pains (and Facebook Comparisons)
- Agile Comes to Data Integration
- Slideshow: 7 security mistakes people make with their mobile device
- iOS vs. Android: Which is more secure?
- 11 sure signs you've been hacked
- Now is the time to implement a video conference solution Video conferencing is getting a lot of buzz lately due to the recent cost decrease, making it tangible for many law firms. It's...
- Video drives engagement Achieving maximum results means building a solid platform and network infrastructure. As digital age unfolds, it's clear that the ability to communicate effectively...
- 10 Steps to Reducing Mainframe MLC Costs Monthly license charges (MLC) are rising by 7% or more each year, and account for 30% of total mainframe costs. Yet managing MLC...
- CRM's Dirty Little Secret: How to Avoid CRM Sticker Shock Three-Year TCO Analysis. Read more>>
- Meg Whitman presents Unlocking IT with Big Data During this Web Event you will hear Meg Whitman, President and CEO, HP discuss HAVEn - the #1 Big Data platform, as well...
- The New Way to Work Knowledge Vault This Knowledge Vault focuses on how, in today's increasingly virtual world, it's more important than ever to engage deeply with employees, suppliers, partners,... All Consumerization of IT White Papers | Webcasts