IT security protocols in flexible working

Cyber lock picture

As people increasingly use their own tablets and smartphones for work, controlling and securing company data can become like herding cats; established IT security policies and protocols don't translate directly to the new 'bring your own device' world.

"In terms of technologies, things such as desktop configuration standards or remote troubleshooting tools, which are typically part of IT policies, cannot be applied to mobile devices because the underlying platforms are very different," says Chenxi Wang, Vice President at Forrester Research.

"In terms of processes, the way you typically manage corporate-owned endpoints cannot be extended directly to employee-owned devices, often because of privacy reasons."

Security protocols and policies for flexible working might encompass: employee use policies and security training; data ownership and data protection; access control to specific resources based on permission levels and policies; encryption requirements; redundancy and disaster recovery.

Business issue

Some of these policies may be supported by technology, but this is a business not a technical issue.

"You need to look across the business (to develop security protocols)," says Steve Durbin, Vice President at the independent Information Security Forum (ISF). "HR, IT and business departments will be involved.

"In an SME it is a broad conversation that is going to be going on at a management team level."

For many businesses awareness training is the best route. For others, mandating upgrades and installation of security measures on their devices prior to accessing company systems, or central provisioning and control of all devices, may be the way forward. Opinions are divided.

"The most effective way of getting users to follow through on the security controls is to make it a necessary condition to access corporate information, such as email," Chenxi Wang says.

"If you have a policy which stipulates that only phones with the latest OS update can access corporate email, and you have technology controls such as mobile device management (MDM) or network gateways to enforce that policy, you'll see that many employees will be happy to exercise the security controls."

Tony Dyhouse, cyber security director at the government-supported ICT Knowledge Transfer Network places more emphasis on trust.

"At the moment the best thing we have is policy," he says. "You have to have a lot more trust in users.

"Yes it can be enshrined in policy, but if you want to turn off a functionality on the device, you are reliant on users and you rarely have the power to do that."

Cloud challenge

Dyhouse points out that a lot of mobile devices sync to the cloud, potentially putting company data out of reach.

"You get a free iCloud account with Apple devices and one of the main purposes of it is to be able to sync calendars and email through a cloud account.

"Before you know it all your work stuff is on the cloud and there is technically no way of getting rid of it or knowing where it is. It is not technically possible to apply policies requiring firewall and antivirus as all security applications are in extremely early days."

The biggest thing is functionality, he believes.

"Anything that starts to break that in the name of security fails because the users don't want it.

"There is only one mobile you can connect to classified networks in the UK and that is a BlackBerry. With a BlackBerry you can turn off the internet access, but then people do say what is the point of it?"

Brian Horsburgh at Dell Kace believes it is important to put in place security protocols that look to the future and encompass all devices, not just smartphones and tablets but also the likes of kiosks and point-of-sale terminals.

Latest in Computing Security
Dark Web monitoring
How users benefit from Dark Web monitoring
The X logo next to a silhouette of Elon Musk
Who was really behind the massive X cyberattack? Here’s what experts say about Elon Musk’s claims
A person holding a phone looking at a scam text with warning signs around
A massive SMS toll fee scam is sweeping the US – here’s how to stay safe, according to the FBI
View on National Assembly building in Paris, France, with French and European flags flying.
France rejects controversial encryption backdoor provision
ensure data security for your business
The complete data protection system for your business
ignal messaging application President Meredith Whittaker poses for a photograph before an interview at the Europe's largest tech conference, the Web Summit, in Lisbon on November 4, 2022.
"We will not walk back" – Signal would rather leave the UK and Sweden than remove encryption protections
Latest in News
An image of Pro-Ject's Flatten it closed and opened
Pro-Ject’s new vinyl flattener will fix any warped LPs you inadvertently buy on Record Store Day
EA Sports F1 25 promotional image featuring drivers Oscar Piastri, Carlos Sainz and Oliver Bearman.
F1 25 has been officially announced, with this year's entry marking a return for Braking Point and a 'significant overhaul' for My Team mode
Garmin clippd integration
Garmin's golf watches just got a big software integration upgrade to help you improve your game
Robert Downey Jr reveals himself as Doctor Doom to a delighted crowd at San Diego Comic-Con 2024
Marvel is currently making a major announcement about Avengers: Doomsday's cast on YouTube, and I think it's going to be a long-winded reveal
Samsung QN90F on yellow background
Samsung announces US prices for its 2025 mini-LED TV lineup, and it’s good and bad news
Nintendo Switch Lite
Forget the Nintendo Switch 2, the original Switch is getting one last hurrah in a surprise Nintendo Direct tomorrow