Bring Your Own... Network?

Bring your own... Network?

Did you think you were just getting used to BYOD and juggling the benefits it brings with the security risks it also entails? Well, get ready, because there is another Bring Your Own phenomenon on the way, and it will potentially bring more headaches to already stressed out IT departments.

The new phenomenon is Bring Your Own Network (BYON). This is, as the name suggests, when employees use their mobile phone's cellular connectivity to set up a personal hotspot.

This means they can, in some cases, bypass the corporate network and access websites, apps and other services that are otherwise banned by IT. Users could also potentially access corporate information and sensitive data on these networks, which are usually unsecured and unmonitored by IT.

In some ways this presents similar issues to BYOD; ensuring sensitive corporate data remains secure and protected while allowing workers all the tools they need to be productive.

However, while IT can put rules and policies in place to govern mobile devices, such as Mobile App Management (MAM), securing networks set up by employees could prove more difficult.

There are of course regulations in place to ensure data is protected. The Data Protection Act (DPA), PCI DSS and ISA's ISO270001 all govern how businesses should look after data, who they should allow to access it and what to do in case of a data breach.

Responsibilities

What is important to realise is that wherever the data is, and whoever and whatever is accessing it, it remains the responsibility of the business to ensure its protection.

That's why data protection is so important. The penalties for data breaches are severe - not just financially but also in terms of potential damage to a company's reputation.

That doesn't mean businesses have to protect each and every device and ban workers from accessing sensitive data - that will just lead to frustrated workers who will take more risks in order to get their jobs done, such as creating their own network.

If the data is protected at its source, and who and what can access it is strictly controlled, then IT does not have to fear the rise of BYON.

Having MAM in place could negate the need for employees to set up their own personal networks, while also ensuring businesses comply with the regulations mentioned above

IT will be able to control the device as if it was one it had provisioned, allowing it to access all necessary applications and data while keeping the employees personal data completely separate. Workers are free to use the device exactly how they want.

For IT workers, it may seem like there is a new problem to solve each and every day when it comes to workers and their mobile devices. If it's not a lost device it's employee-owned devices or, as we're seeing now, employees setting up their own networks.

But the key here is to protect what's important: corporate data. Don't worry about the devices themselves.

Control the access. Control who can access corporate data, what they can access, where they can access it from and what devices they can use. Get that aspect right and BYOD and BYON can become easy to handle and act as a great enabler for workers to be more productive.

  • Nathan Pearce is Product Manager for EMEA at F5 Networks. Pearce joined F5 in 2006 and is currently the product manager for EMEA. His role includes managing F5's product portfolio across all areas, including the security, datacenter and service provider sectors
Latest in Pro
Isometric demonstrating multi-factor authentication using a mobile device.
NCSC gets influencers to sing the praises of 2FA
Sam Altman and OpenAI
OpenAI is upping its bug bounty rewards as security worries rise
Context Windows
Why are AI context windows important?
BERT
What is BERT, and why should we care?
A person holding out their hand with a digital AI symbol.
AI is booming — but are businesses seeing real impact?
A stylized depiction of a padlocked WiFi symbol sitting in the centre of an interlocking vault.
Dangerous new CoffeeLoader malware executes on your GPU to get past security tools
Latest in News
Nintendo Switch 2 Joy-Con up-close from app store
Nintendo's new app gave us another look at the Switch 2, and there's something different with the Joy-Con
cheap Nintendo Switch game deals sales
Nintendo didn't anticipate that Mario Kart 8 Deluxe was 'going to be the juggernaut' for the Nintendo Switch when it was ported to the console, according to former employees
Three angles of the Apple MacBook Air 15-inch M4 laptop above a desk
Apple MacBook Air 15-inch (M4) review roundup – should you buy Apple's new lightweight laptop?
Witchbrook
Witchbrook, the life-sim I've been waiting years for, finally has a release window and it's sooner than you think
Amazon Echo Smart Speaker
Amazon is experimenting with renaming Echo speakers to Alexa speakers, and it's about time
Shigeru Miyamoto presents Nintendo Today app
Nintendo Today smartphone app is out now on iOS and Android devices – and here's what it does