立即打开
自带设备上班安全吗?

自带设备上班安全吗?

Varun Nayar 2013年08月09日
最新调查研究显示,美国72%的智能手机用户承认大多数时候都把手机放在身边5英尺的范围内,而且还有人甚至还把它们带到特殊的场合,如在洗澡(12%)和上床(9%)的时候。当然,人们也会把自己的手机带到办公室。把自己的装备带到办公室已经越来越司空见惯了,但是泄密的风险怎么解决?

    有些人好像受不了手机不在身边的感觉。据移动解决方案公司Jumio委托市场调查公司Harris Interactive最近进行的调查研究显示,美国72%的智能手机用户承认大多数时候都把手机放在身边5英尺的范围内,而且还有人甚至还把它们带到特殊的场合,如在洗澡(12%)和床第之欢(9%)的时候。

    真的假的?

    当然,而且还包括在干活的时候。职场人士开始用自己的设备进行工作,这样他们能在发工作邮件的时候发一些私人信息(“咱6点在McGritty's见!”),从而把私事和公事结合在一台设备上。

    麦肯锡(McKinsey)的一份报告称,在工作中使用的智能手机有80%是员工个人所有。企业也在不断适应这一点——摆脱只能办公室才能使用的设备【如黑莓(BlackBerry)】,同时制定自带设备【Bring Your Own Device,简称(BYOD)】政策,以便更好地管理那些必然会拿起自己手机的员工们的使用习惯,因为他们不论公私事,全天候在线。

    Jumio首席营销官兼策略官马克•巴拉克说,我们正处在智能手机的“爆炸式增长阶段”。用户在这个阶段会不断地试验不同类型的手机硬件和软件,“测试着所有的方面”。通过顺应BYOD风潮,企业实际上能用更低的成本提高生产力,因为员工可能在正常的上班时间外继续工作,而且士气更高,行动更便利。因此,优利系统(Unisys)报告称相当多的求职者对那些支持员工自带设备的企业给出更加正面的评价也就不足为奇了。

    当然,从企业的角度来看,BYOD也有不利之处,最严重的问题是安全漏洞。麦肯锡称,将近90%的员工用私人设备完成25%以前用电脑完成的工作。实际上这些设备可能保留了与工作相关的信息,一旦把它们带回家用作私人用途,重要的公司数据就流出了公司的IT墙时,事情就会变得复杂起来。加上手机存在可能丢失或被盗的风险。更别提还有偷窥的情况:Jumio研究表明,约29%的美国智能手机用户承认偷看过别人手机里的内容。而且,只有一半在工作中使用私人设备的员工签订过约束这一行为的公司协议。人们不禁疑惑,这个新的世界将到底有多安全。

    赛门铁克移动解决方案公司(Symantec Mobility Solutions)副总裁迈克尔•林对此倒很乐观:“我们相信在顺应BYOD潮流的同时也可能保持安全。”林提及一种称为移动应用管理(Mobile Application Management,简称:MAM)的概念,这种管理技术能将企业应用及数据和用户私人信息隔离。

    林承认“真的没有哪种策略适用于所有的BYOD,”而且每个公司都有一些不同的需求:有些公司主要关注常见私人工作设备(包括智能手机和平板电脑)的安全问题,另一些可能更关注的却是为设备建立一个成本分摊计划。任何一家公司采用BYOD政策之前都应该为相关后果做好准备。林说:“BYOD政策的好坏关键在于这家公司执行这项政策的能力。”

    说得有道理。(咱McGritty's见!)(财富中文网)

    译者:默默    

    Seems like some people can't bear to part with their smartphones. According to a recent study by mobile solutions company Jumio Inc. -- and conducted by market research firm Harris Interactive -- 72% of smartphone users in the U.S. admit to being at least five feet away from their devices most of the time, and even taking them to unusual places like the shower (12%) and between the sheets (9%).

    Seriously?

    And then of course there's work, where employees have begun using their own devices for on-the-job purposes, allowing them to send personal texts ("Meet U at McGritty's @ 6!") alongside work emails -- blending the personal and the professional onto a single device.

    McKinsey reports that some 80% of the smartphones used at work are employee-owned. Companies are adapting -- getting rid of exclusively workplace devices (like the BlackBerry (BBRY)) and designing Bring Your Own Device (BYOD) policies to better govern the habits of employees who will inevitably be on their own phone -- and personally and professionally connected -- around the clock.

    Marc Barach, chief marketing and strategy officer of Jumio Inc., says that we're currently in the "explosion phase" with smartphones, where "all playing fields are being tested out;" consumers are constantly experimenting with different styles of mobile hardware and software. By jumping on the BYOD bandwagon, companies can actually improve productivity, through lower costs, potential for employees to work outside the regular company schedule, and an overall increase in employee morale and convenience. Not surprisingly, Unisys reports that a significant number of jobseekers view an organization more positively if it supports their device.

    Of course, there's a downside to BYOD from the corporate perspective, the most serious of which are security breaches. McKinsey reports that nearly 90% of employees use personal devices to do 25% of the work they once did on PCs. The fact that these devices can retain work-related information and then be taken home for personal use is where things start to get complicated -- when important corporate data trickles outside a company's IT wall. Added to that is the possibility of phones being lost or stolen. Never mind snooping: The Jumio study says some 29% of American smartphone users admit to noseying in on someone else's phone. And only half of employees who use their personal devices at work have even signed a policy that governs that behavior. Makes you wonder just how secure this new world is going to be.

    Michael Lin, vice president of Symantec Mobility Solutions, is optimistic: "We believe it's possible to maintain security while embracing BYOD." Lin points to something called Mobile Application Management, or MAM, which are technologies that segregate enterprise applications and data from user-owned information.

    Lin acknowledges that "there's really no one-size-fits-all BYOD strategy," and that all companies have somewhat different needs -- while some may focus primarily on the security issues with common personal-work devices (smartphones and tablets included), others may want to focus on setting a cost-sharing plan for the device. And before any company adopts a BYOD policy, it should be ready for the consequences: "A BYOD policy is only as good as a company's ability to enforce it," says Lin.

    Makes sense. (C U at McGritty's!)   

  • 热读文章
  • 热门视频
活动
扫码打开财富Plus App