David Robertson, Vice President of Engineering at Zix, discussed some of the challenges that are frequently associated with bring-your-own-device (BYOD), mobility and personal devices during a Thought Leadership Spotlight Presented by Zix at the 2014 Chief Information Security Officer (CISO) Leadership Forum in Dallas on Oct. 2. In his presentation, “Better BYOD: Engineered for Security, Designed for Users,” Robertson noted organizations can take a variety of approaches to secure their sensitive data, and technology is readily available to help them protect their data against numerous cyber threats.
According to Robertson, email encryption has become a viable IT security option for organizations worldwide. Because encryption helps keep hackers at bay, Robertson said, it can instantly enable an organization to secure its IT infrastructure. However, BYOD remains a major challenge for many organizations, Robertson added: “I have no ability if somebody brought their own device unless I enforced some kind of set of controls to wipe that data off or even know what’s been released … The last thing anybody wants is to have unknown volumes of it out there for the taking by the bad guys in the community.”
Many employees are demanding BYOD, Robertson said, which is putting additional pressure on organizations. An organization that develops the necessary policies to protect its IT infrastructure, Robertson noted, can offer BYOD to workers and avoid IT security issues: “At the end of the day, the user community is not only demanding that their needs be accommodated as it relates to this bring your own device dynamic, they’re also recognizing that the controls are being made available in the industry. As soon as they know that the tools to have this need met are available somewhere, they’re going to become more urgent in terms of making the demand.”