December 21, 2016 By Rick M Robinson 2 min read

A sophisticated, ingenious and highly distributed mobile threat is gathering its forces, preparing to attack your network at the end of the year. In a steadily growing flood, it is moving from store shelves to hiding places under millions of holiday trees, from where it will launch its stealth attacks.

Is your bring-your-own-device (BYOD) policy ready for the holiday onslaught of new mobile devices and technology? Ready or not, here it comes.

Millions of people, including your employees, will be playing with new and more powerful smartphones and other mobile devices — and trying them in the office. Even virtual reality (VR) tech is going mainstream, Network World recently reported.

A Cloudy BYOD Policy

BYOD is an unstoppable force in the modern workplace. Now, it is possible to build highly restrictive networks largely sealed off from BYOD. In fact, for some functions in some industries, this is necessary for regulatory compliance. But these amount to specialized exceptions. In most of the enterprise world, people expect and even need to use their personal mobile devices in the workplace.

The real BYOD policy challenge stems not just from employees’ mobile devices themselves, but also from the clouds that come with them. Mobility and cloud computing are two sides of one coin, because once people own and use two devices, the cloud becomes inevitable. Even data stored locally on one device is technically in the cloud.

This is why shadow IT is proliferating. According to CIO, organizations may have 17 to 20 times more cloud applications running than their chief information officers (CIOs) are aware of. A large portion of these cloud services are handily available via smartphone apps. Employees are liable to use these services without a second thought. Who thinks of handy mobile apps that we use every day as shadow IT?

The Reality of Virtual Reality

If the Pixel X phone and Daydream VR headset take off as Google hopes — or some other equivalent technology combination becomes a holiday hit — VR will also be knocking on the office door over the holidays.

This takes us into new terrain for BYOD policy, because we really don’t know what the implications will be. On one hand, what new capabilities will VR provide, and how will these be managed? On the other hand, what happens if, say, an inaccurate VR map leads to a workplace accident?

Now is the time for IT leaders to ask critical questions to solidify their BYOD policies. Are employees aware of the policy? If it calls for whitelisting of devices, is it actually enforced? And how does the policy address mobile applications? Knowing the answers to these questions will help IT security teams face the mobile technology onslaught.

More from Endpoint

Unified endpoint management for purpose-based devices

4 min read - As purpose-built devices become increasingly common, the challenges associated with their unique management and security needs are becoming clear. What are purpose-built devices? Most fall under the category of rugged IoT devices typically used outside of an office environment and which often run on a different operating system than typical office devices. Examples include ruggedized tablets and smartphones, handheld scanners and kiosks. Many different industries are utilizing purpose-built devices, including travel and transportation, retail, warehouse and distribution, manufacturing (including automotive)…

Virtual credit card fraud: An old scam reinvented

3 min read - In today's rapidly evolving financial landscape, as banks continue to broaden their range of services and embrace innovative technologies, they find themselves at the forefront of a dual-edged sword. While these advancements promise greater convenience and accessibility for customers, they also inadvertently expose the financial industry to an ever-shifting spectrum of emerging fraud trends. This delicate balance between new offerings and security controls is a key part of the modern banking challenges. In this blog, we explore such an example.…

Endpoint security in the cloud: What you need to know

9 min read - Cloud security is a buzzword in the world of technology these days — but not without good reason. Endpoint security is now one of the major concerns for businesses across the world. With ever-increasing incidents of data thefts and security breaches, it has become essential for companies to use efficient endpoint security for all their endpoints to prevent any loss of data. Security breaches can lead to billions of dollars worth of loss, not to mention the negative press in…

Topic updates

Get email updates and stay ahead of the latest threats to the security landscape, thought leadership and research.
Subscribe today