ABSTRACT

Bring your own device (BYOD) or bring your own technology (BYOT), two of the newer acronyms within information technology (IT) has unleashed the age of IT consumerization. With the proliferation of various types of mobile devices and the consumerization of IT, corporate networks are becoming more challenging to manage and are more at-risk every day. The days of a static, one-size-fits-all policy applied to company-owned assets are over. Today, information security needs to understand what devices are trying to connect to their networks, so that they can provide secure layered access to those that are authorized. Today’s mobile devices no longer include just a cell phone. Devices such as iPhones, Androids, smartphones, iPads, and tables are minicomputers; they have processing power, storage, communications, applications, and, more importantly, they are not always owned by the organization. The risk to organizational assets is now more distributed and uncontrolled. Information security needs to understand the risk and provide controls to limit this increasing risk to organizational information assets.