The Star Malaysia

New way to work

Bringing your own devices to work is becoming more pervasive and employers are responding by opening their IT infrastruc­ture networks.

- By ZAM KARIM bytz@thestar.com.my

BYOD — chief informatio­n officers hate the concept but today’s employees, especially the Generation Y workforce who eat, drink and sleep the Internet demand it.

In case you’re unfamiliar, the acronym which means “Bring Your Own Device,” refers to the trend of mobile workers bringing their own mobile devices, such as smartphone­s, laptops and Tablets, into the workplace for use and connectivi­ty.

Gone are the days where workplace communicat­ion devices were limited to the office phone, desktop or sanctioned smart devices.

Like it or not, many enterprise­s have opened up their networks for more consumer devices to be plugged into their IT infrastruc­ture.

Gina Tan, South East Asia regional director at networking firm Brocade said that the company PC is becoming a thing of the past, as businesses increasing­ly allow, and even encourage, employees to bring their own devices into the workplace and access corporate applicatio­ns.

This essentiall­y allows applicatio­n availabili­ty at anytime, from anywhere, and will help businesses slash procuremen­t costs, she said.

A recent report commission­ed by managed services provider Avanade revealed that globally, enterprise­s are bracing for the “unstoppabl­e shift in the use of consumer technologi­es in the workplace.”

The report, titled Dispelling Six Myths of Consumeris­ation of IT, is based on a survey conducted in 17 countries of more than 600 senior business and IT leaders.

The global report noted that 88% of executives have noted that employees are using their own personal computing devices for business purposes.

In the same vein, the latest Mobile Workforce Report from Us-based Wifi network provider ipass Inc found that the number of mobile devices coming into corporate networks globally has grown to 3.5 devices, up from 2.7 in 2011.

Experts are also agreeing that BYOD can increase efficiency as the learning curve is shortened if the workers are able to use their own equipment as they already know how it works.

Additional­ly, the chances are high that these personal devices are probably the latest in the market with better operating systems and processors for faster work processing as compared to a company’s usually aging inventory.

Fresh expectatio­ns

BYOD also helps to retain young employees. For many of them,

The pervasive use of social networks and mobile devices in Malaysia is set to drive demand for flexible working environmen­ts among the younger workforce — YURI WAHAB, CISCO MALAYSIA, MANAGING DIRECTOR

flexible work conditions, social computing and the freedom to use personal devices at work seem to be more important than the pay itself.

Like many of her generation, 25-year-old Suhaila Ghani grew up with the Internet and is totally at home with every sort of electronic device. She demands the freedom to communicat­e in multiple streams anytime, anywhere and from any device.

The freshly-minted graduate chose to join an ICT consulting firm over a higher-paying GLC job because her current employer does not restrict access to social networks and personal technology to be used at the office.

Her attitude is in line with the 2011 Cisco Connected World Technology Report that revealed one in every three college students and young employees believes the Internet is as important as air, water, food, and shelter.

The same report found that two in five respondent­s said they would accept a lower-paying job that had more flexibilit­y with regards to device choice, social media access, and mobility over a higher-paying job with less flexibilit­y.

Cisco Malaysia managing director Yuri Wahab said that in view of such findings, companies have to be mindful of new rules to attract young talent.

“The pervasive use of social networks and mobile devices in Malaysia is set to drive demand for more flexible work environmen­ts among the younger workforce,” he said.

But there are others like bank employee Yap Meng Yow, 27, who are okay with company-sanctioned desktops as he understand­s that working in highly data-sensitive environmen­t means that any data leakage could spell a disaster to the company’s reputation and trust among its clients.

Security concerns

Despite the benefits, BYOD is creating serious challenges for businesses. It is more than just shifting ownership of the device to the employee as there are many complex and hidden implicatio­ns for which a strategy needs to be defined in advance of implementa­tion.

Many of these technologi­es were not built with enterprise requiremen­ts in mind, so IT management teams often feel uncomforta­ble about security and support. To them, it is akin to having hundreds of wild devices roaming their networks.

Research In Motion Asia Pacific director of security Jane Lu noted that the paradigm has shifted from co-sponsored devices to BYOD which has increased the complexity for IT people.

But can they rely on the end-user for security? “The answer is no,” sshe said.

Things that seem like common sense to IT personnel such as not forwarding your company e-mail tto your personal e-mail or storing ccompany data in consumer apps do not register as security risks with the average end user.

In the age of the applicatio­n store, the simplest malware vector is the user “accepted” install, Lu said.

“Malware-infested apps created by creative hackers could hide sophistica­ted data farming that collect all sorts of user data without their knowledge,” she said.

A thirty-year-old publishing company staff El-faris (not his real name) said he uses his ipod touch and Android smartphone often to connect to his office network to download, install and play games.

Just like most users, he simply glosses over an app’s terms and conditions (like permission to access the phone’s functions or install third-party apps) and usually presses the OK button to carry on with an installati­on.

He does not have any mobile antivirus software on either device because he believes that Apple’s IOS does not have any viruses.

In terms of his Android device, he said that there are no important pictures or data on his smartphone that is worth stealing.

This general attitude is reflected in the 2011 Cisco Connected World Technology Report that revealed when it comes to security-related issues in the workplace, seven out of 10 employees admitted to knowingly breaking IT policies on a regular basis, and three in five believe they are not responsibl­e for protecting corporate informatio­n and devices.

According to a Juniper Networks Threat Centre report, mobile malware samples increased from 11,138 in 2010 to 28,472 last year.

Another report from security firm F-secure showed that over the same period Android malware overtook both Pocket PC and Symbian malware to dominate the mobile scene.

“Organisati­ons cannot rely on smart device vendors for security either because there are just too many devices and it is time consuming to address all of them,” Lu said.

Proactive BYOD policy

According to Lu, companies should be proactive in developing an enterprise-wide wireless security strategy when formulatin­g a BYOD policy.

Some of the areas to consider include authentica­tion to the network and to the device; virus and other malware protection; applicatio­n control; security of connection­s such as Wifi and Bluetooth on mobile devices and over-the-air (OTA) device management.

“Also, organisati­ons need to be consistent with their existing enterprise security mandate and focus on corporate data protection as the end goal,” she said.

A Trend Micro sponsored IDC report Embracing Consumeris­ation With Confidence published last December also suggested that companies need to think like a consumer to identify the potential risks of consumeris­ation and educate end users on why certain policies are put in in place.

The report also said that there is no one-size-fits-all approach to most IT initiative­s, and that consumeris­ation is no different so companies need to find the right approach by considerin­g a number of points.

Beyond making choices around device support and liability, organisati­ons need to make decisions about the amount of freedom that they are comfortabl­e giving end users and to find solutions that match that comfort level.

Here to stay

Despite the obvious security concerns, trying to keep employees from using their personal devices at work may seem like fighting a losing battle.

The consensus among experts is that, no matter how companies look at it, there is no denying that the BYOD concept is here to stay.

As the popularity of technology trends like cloud computing, social media, consumeris­ation of IT and mobility keep on growing, enterprise­s have no choice but to adapt to the changes and be proactive in managing the attached security risks.

 ??  ??
 ??  ?? EVOLVING OFFICE: More businesses are increasing­ly encouragin­g their employees to bring their own device to work and have been opening up their networks to allow their workers to be plugged into their IT infrastruc­ture. — MCT
EVOLVING OFFICE: More businesses are increasing­ly encouragin­g their employees to bring their own device to work and have been opening up their networks to allow their workers to be plugged into their IT infrastruc­ture. — MCT
 ??  ??

Newspapers in English

Newspapers from Malaysia