BYO computers: cloud security risk?

BYO computers: cloud security risk?

Summary: Allowing staff to choose their own computer and smartphone rather than using the standard company roll-out will, in theory, help attract talented staff rather than corporate droids. But what about the security risks once the IT department loses control?

SHARE:
TOPICS: Cloud
0

Allowing staff to choose their own computer and smartphone rather than using the standard company roll-out will, in theory, help attract talented staff rather than corporate droids. But what about the security risks once the IT department loses control?

Last week there was news from the US that back in 2008 the biggest security breach of military computers in their history could be traced back to a single unauthorised USB flash drive. Both unclassified and classified data networks were compromised, and Operation Buckshot Yankee was launched to clean them out.

Imagine the far bigger breaches that might be possible when compromised smart devices start hopping from network to network.

In Patch Monday this week, Stilgherrian discusses the security aspects of BYO computers with three Australian information security specialists. Paul Ducklin is Sophos' head of technology for the Asia Pacific region. Ajoy Ghosh is chief information security officer at Logica Australia. And Crispin Harris is the head of network security for a fast-growing Australian resources company.

They also discuss some of the potential legal risks of putting your data in the cloud — including the ease with which it could end up in a different legal jurisdiction.

Patch Monday also includes Stilgherrian's random look at some of the week's IT news headlines.

To leave an audio comment for Patch Monday, Skype to stilgherrian, or phone Sydney 02 8011 3733.

Running time 30 minutes, 26 seconds

Topic: Cloud

About

Stilgherrian is a freelance journalist, commentator and podcaster interested in big-picture internet issues, especially security, cybercrime and hoovering up bulldust.

He studied computing science and linguistics before a wide-ranging media career and a stint at running an IT business. He can write iptables firewall rules, set a rabbit trap, clear a jam in an IBM model 026 card punch and mix a mean whiskey sour.

Kick off your day with ZDNet's daily email newsletter. It's the freshest tech news and opinion, served hot. Get it.

Talkback

0 comments
Log in or register to start the discussion