Home » , » Bring Your Own Devices (BYOD)

Bring Your Own Devices (BYOD)

Written By Blog Walker on Apr 13, 2013 | 4/13/2013

The concept of Bring Your Own Devices (BYOD) echoed the popularity, it can not be implemented in all areas. Examples such as in military institutions, which are considered instead will be a disaster.

According to security firm Trend Micro, assessed the safety factor susceptible so that these institutions are still reluctant to apply the concept of BYOD. This is also done by the U.S. military institutions.

It said in its report, the military institution does not have a security device to implement BYOD policies. So feared would have caused the failure that resulted in the existence of security threats in cyberspace.

J. Nicholas Hoover, the Inspector General of the U.S. military institute, wrote in his report, the U.S. armed forces are so excited to the era of BYOD and use mobile devices in military activity.

But there must be a comprehensive policy for the use of training devices and applications according to the capacity in the military field.

Hoover also said that there are still many military employees on mobile devices is still storing personal data and sensitive.

"Some failures will be the security of the data in the application of BYOD often happens, however, if it is applied in military institutions, the error should not occur or be minimized," said Trend Micro.

As had occurred some time ago, the device is purchased must be arranged so that the data can be deleted remotely, according to regulations from the Pentagon.

However, because the mechanism is not good, there are two devices that were stolen in home military members who worked as a technician and a lost device can not be controlled remotely.

Based on the results of tests carried out on military force shows that 15 of the 48 examined mobile devices do not have a password, so that errors can result in data security and resulted in malicious activity in doing military duty.

Besides do not have a password, use of smartphones and tablets are also considered less appropriate because of the potential for leaking data and inviting cyber security attacks.


0 komentar:

Post a Comment

Thank you for reading this blog useful please leave a comment below . . .

Custom Search

Popular Posts