">
TechMoran
  • About Us
  • Deals
  • Jobs
  • Motoring
    • Money
  • Pitch Your Startup
  • Submit Your Post
  • Freelance Gigs
  • Travel
  • Men’s Corner
  • Dating
Saturday, January 23, 2021
  • Startups
  • Reviews
  • Insider
    • Obituaries
  • Business
  • Women
  • Blockchain
  • Columnists
  • Hacks & Facts
    • How To
  • Editions
    • US Edition
    • India Edition
    • MENA Edition
    • Asia Edition
    • Europe Edition
    • International Edition
No Result
View All Result
TechMoran
">
Home Business

Industry Should Evolve & Adapt To Trends Such As BYOD

Milcah Lukhanyu by Milcah Lukhanyu
8 years ago
in Business
8 min read
0
Andrew Chester, Security Officer at Ukuvuma Security Solutions
Andrew Chester, Security Officer at Ukuvuma Security Solutions

The growth of consumerisation scenarios within business is forcing decision makers to adapt to emerging IT consumerisation trends – particularly BYOD (Bring Your Own Device).

 

This is the view of executive management of Ukuvuma Solutions, an established South African ICT solutions and support provider.

 

The company contends that the protective “walls” that businesses construct to deflect infiltrations and exfiltrations, whilst not providing some level of threat intelligence and provisioned access models (such as Role Based Access Control) as well, is rendered useless when it comes to BYOD.

 

“ICT, and security, must adapt to this trend and deploy tools to mitigate the plain fact that data control is no longer merely deploying internal technology to control security rights and policies,” says Andrew Chester, Security Officer at Ukuvuma Security Solutions.

Related posts

Customer Service Lessons From Leading Brands Including CarGuard’s Trevor Smith

January 21, 2021
0

Mastercard, Unilever & KCB Bank to pump over $150,000 into SMEs in Kenya via their Jaza Duka program

January 18, 2021
0

Cellulant Group CEO Ken Njoroge to step down in June

January 14, 2021
0

The Fool-Proof Strategy For Business Owners To Find The Perfect Office Space

January 13, 2021
0

 

One of the most significant challenges with BYOD is the lack of control. “Devices can access multiple networks at any given time, and that opens up several threat vectors which a common workstation, situated within an organisation, wouldn’t necessarily be subjected to. Networks aren’t the only problems, mobile devices have differing operating systems and software which is utilised. Everyday security controls, such as application control is now much more difficult, if not impossible. You can control applications on mobile devices – however that means restricting a device, such as an iPad or iPhone, and preventing a large part of the feature-set which it was created and bought to be utilised for,” adds Chester.

READ  Kenya's smartphone penetration set to increase with new micro-credit service

 

Ukuvuma Security Solutions suggests that against a backdrop of the advanced nature of attacks, today’s software has not advanced sufficiently to secure computers safeguard the business entirely and protect data.

 

“Anti-virus is essentially dead when it comes to securing computers due to the advanced nature of attacks today. By the time a software/system vulnerability is found and exploited (known as a zero-day), it usually takes an anti-virus software manufacturer several days to release a signature to detect the exploit,” Chester continues.

 

By this time the exploit will have already infected thousands of computers, and given the exploit-handler time to patch the vulnerability and hide their presence on a computer, he continues.

 

“Many will argue that this is exactly the reason why one should look at defence in depth to protect computers today, namely a combination of defences other than just an anti-virus system, and I would agree – that is exactly one of the key things to look at within any organisation to defend against security threats. However, defence in depth is not only comprised of technological systems such as security software – it can’t be. It must comprise the human element and procedural control systems as well,” says Chester.

 

There is something to be learned here says Ukuvuma. The company says most businesses are aware of the need to protect their infrastructure, but not of the extent to which they need to do this.

 

To achieve higher levels of effective security and address challenges, Ukuvuma advises that companies construct a BYOD program with clearly defined goals. These goals should include subjects such as social goals, risk management, sustainability and processes that should be followed in the event a device is compromised and/or lost.

READ  Freelancer.com now in online payment space with US$7.5 m Escrow.com acquisition

 

“Risk management would touch on how to control BYOD devices, whilst not crippling the user’s device, whilst sustainability includes topics such as how to ensure the BYOD program includes security for the organisations applications and data. Once you have your goals listed, define steps to achieve them – such as remediation options that address your risk, process and sustainability management. Options could include implementing policies and access control mechanisms, separating personal and corporate data, tracking devices and identifying users on the devices,” Chester continues.

 

A BYOD program should never be just technology-based, the company suggests, it should include organisational requirements, documented processes, user training and metrics to measure how well these implemented processes and procedures are performing.

Ukuvuma Solutions is a South African based company focussed on ICT consulting and development services, spanning various industries and technology platforms.

 

Established in 2004, the company services a broad spectrum of businesses, including those within the small-to-medium space as well as major enterprise/ blue chip clients.

 

The Ukuvuma brand is synonymous with leadership within ICT and reliability across global markets. It is associated with the rollout of innovative and sustainable business solutions that are designed to empower organisations to compete in a shifting global economy.

 

Its ICT service portfolio incorporates Solutions, Products (HP, IBM, Lenovo and Microsoft), consulting and Managed Services.

Readers 1,129

Share

  • Click to share on Telegram (Opens in new window)
  • More
  • Click to share on Tumblr (Opens in new window)
  • Click to print (Opens in new window)
  • Click to share on LinkedIn (Opens in new window)
  • Click to share on Pinterest (Opens in new window)
  • Click to share on Reddit (Opens in new window)
  • Click to share on Pocket (Opens in new window)

Like this:

Like Loading...

Related

Milcah Lukhanyu

Milcah Lukhanyu

Milcah Lukhanyu covers daily news briefs at TechMoran. She is the person who will probably read your press release and get the story out of it or totally trash it. Send tips to [email protected]

Related Posts

Business

Customer Service Lessons From Leading Brands Including CarGuard’s Trevor Smith

January 21, 2021
0
Business

Mastercard, Unilever & KCB Bank to pump over $150,000 into SMEs in Kenya via their Jaza Duka program

January 18, 2021
0
Business

Cellulant Group CEO Ken Njoroge to step down in June

January 14, 2021
0
Business

The Fool-Proof Strategy For Business Owners To Find The Perfect Office Space

January 13, 2021
0
Business

UAP Old Mutual launches digital last expense cover for as low as Ksh 50

January 13, 2021
0
Business

How to Use Podcasts and Online Information to Enhance Ventures

January 6, 2021
0
Business

Equity Group crosses the trillion-shilling balance sheet milestone

December 23, 2020
0
Business

Econet Group’s Strive Masiyiwa Appointed to Netflix Board of Directors

December 17, 2020
0

https://bit.ly/2VOxuoBhttps://bit.ly/2VOxuoBhttps://bit.ly/2VOxuoB
ADVERTISEMENT

Join our Mailing List

Loading

Recent Posts

Top 5 Skills That Modern Software Developers Need to Have

January 22, 2021

Why Bernie Sanders Is A Trending Meme

January 22, 2021

What Software Developers Need to Know About Burnout

January 22, 2021

Which Tech Companies Are Employee Owned and Why?

January 22, 2021

Free money transfer service Taptap Send launches its services to Kenya

January 22, 2021
">
">

Follow Us

">

There are many sites out there focused on blowing off some steam, from funny entertainment to thrilling experiences like playing online, in some cases online gaming could grant you the chance to win extra money. We came across rocketpot.io while browsing for a good btc casino online and it left us a very good impression with their wide variety of games and crypto offering.

Privacy & Cookies: This site uses cookies. By continuing to use this website, you agree to their use.
To find out more, including how to control cookies, see here: Cookie Policy

© 2019 Moran Media Group - All rights reserved TechMoran.

No Result
View All Result
  • Startups
  • Reviews
  • Insider
    • Obituaries
  • Business
  • Women
  • Blockchain
  • Columnists
  • Hacks & Facts
    • How To
  • Editions
    • US Edition
    • India Edition
    • MENA Edition
    • Asia Edition
    • Europe Edition
    • International Edition

© 2019 Moran Media Group - All rights reserved TechMoran.

Login to your account below

Forgotten Password? Sign Up

Fill the forms bellow to register

All fields are required. Log In

Retrieve your password

Please enter your username or email address to reset your password.

Log In
This website uses cookies. By continuing to use this website you are giving consent to cookies being used. Visit our Privacy and Cookie Policy.
%d bloggers like this: