CIOs figure out how to gain a hold over BYOD
CIOs throughout the United States often outsource to remote database support services to provide their companies with mobile device management systems. However, getting employees to adhere to security protocols is a challenge in and of itself. This difficulty is causing executives to wonder whether or not they should reward their workers for participating or reprimand them for failing to do so.
Popular, but risky
The Oklahoman reported that even computers disconnected from the Internet are at risk of obtaining a virus. Davis Merrey, owner and chief executive of TeamLogic IT, informed the source that the church he regularly attends in Oklahoma City had to rebuild its PC after someone uploaded corrupted files from a mobile device onto the machine.
Although the idea of accessing work-related documents from anywhere at any time is appealing to both business leaders and their subordinates, adhering to security policies and regulating access remains a challenge. As a result, database administration experts have recommended that enterprises distribute their own smartphones or tablets – which are typically regulated by DBA professionals – to employees. However, such a process can be quite expensive for businesses with a limited budget.
Some organizations have simply chosen to ban bring-your-own-device practices altogether. An anonymous mechanic working at Tinker Air Force Base claimed that the government's concern regarding cyber warfare has caused officers to prohibit airmen and employees from plugging electronic devices into the base's computers.
To tempt or punish?
Tom Kaneshige, a contributor to CIO, noted that companies still want to benefit from the cost savings and enhanced operability associated with BYOD. In order to do so, executives are realizing that they need to make those working beneath them care more about database security. Kaneshige referenced a survey of 500 employees conducted by Centrify, which showed that 43 percent have accessed sensitive corporate information while connected to an unsecured public network.
Due to this apparent apathy, some CIOs are outsourcing to database experts who can erase unauthorized applications and data held on smartphones or tablets or prevent them from obtaining enterprise data via certain connections. However, this process contradicts the reasons why companies allow their employees to participate in BYOD in the first place.
Josh Bouk, vice president of sales and marketing at Cass, told Kaneshige that his company offers its workers a monthly stipend in exchange for enrolling in Cass's BYOD policies. Employees undergo eligibility screening and then are granted permission to access the organization's databases.