SHINY TOY SYNDROME
While tech-giddy employees are prone to fawn over every new iThing smuggled into the workplace – devices that are often used in violation of company policy – IT security pros see something very different: a security breach waiting to happen. For security, the hard fact is many of these unauthorised devices can slash gaping holes in an architectural practice’s security systems, exposing company data and applications to hackers.
“My concern for the practice is cyber security,” says Ben Mountford, principal architect, Mountford Architects (www.marchitects.com.au). “Any phone that could be hacked and access workplace data on the cloud via apps like Dropbox or work email would be something I’d like to avoid.”
Indeed, even devices that have been formally authorised for company use can keep security IT up at night, given that a current network software solution may not be designed to handle some of the newer smartphones and tablets popping up in the marketplace.
“Bring your own device can be a double-edged sword for
You’re reading a preview, subscribe to read more.
Start your free 30 days