BYOD GadgetsThere is massive hype around BYOD. Additional definitions like Bring Your Own Disaster add more to the FUD (Fear, Uncertainty and Doubt) quality of the acronym. Because it’s painted as such a dangerous phenomenon, enterprises may assume it’s overhyped and ignore it.

In a ComputerWorld interview, Paul Luehr, former federal prosecutor and supervisor of the Internet fraud program at the FTC, addresses how much of the hype is real and what enterprises should be worried about. Three points stood out as the strongest takeaways:

  1. The Bad Leaver – (A name for someone who leaves the company on bad terms, possibly for a competitor, and has access to IP and confidential information on their mobile device.) The enterprise is no longer dealing solely with the information on the device itself but also on the applications. For example, if an employee uses DropBox to store files, these files are accessible anywhere DropBox is opened. This can be especially relevant in the federal government where recently published guidelines widely ignore BYOD.
  2. Texting is a Mobile Security Blind Spot – Back to what I referenced in my SnapChat blog, text messages appear only on phones, can be destructed once opened, and are not naturally recorded. Unlike traditional security woe sources like files, texts may never be seen by the enterprise especially on an employee’s own device.
  3. The Downfall of BYOD –With these worries, is BYOD going to be ruined by the needs of mobile security? Not a chance. This is where security needs to address the mobility aspect, accept the new challenges, and implement innovative ways to secure devices, information, and the corporation’s security.

From a recent study done when AirPatrol Corporation was at CTIA, when it comes to who is responsible for mobile device security, 82 percent of employees and 67 percent of IT professionals said it is the employee’s responsibility. Actual security will only be reached with a layered approach of the right products including aspects like location, detection, monitoring, and MDM/MAM.