Page 478 - Using MIS
P. 478

Security Guide








            are we proteCtinG them from me
            or me from them?


            I’m Justin,  I  work  in  operations.  My  boss  asked  me   Fifty  years:  that’s  how  long  it’s  been  since  he  carried
            to  join  a  committee  the  IS  department  just  created.  The   that 40-pound adding machine home.
            purpose of the committee is to determine our company’s   His  story  got  me  wondering  when  the  data  security
                 3
            BYOD   policy.  Well,  that’s  not  quite  right.  The  IS  depart-  problem  started.  Long  before  mobile  devices,  I  think.
            ment will determine the policy, but they want to hear from   Twenty years ago, you could copy data onto a CD and take it
            active mobile users before they do so. This committee may   out of the office. Later you could use a thumb drive or take
            be a waste of time. I don’t know. But I do meet some inter-  it home on your laptop and, if you wanted to steal it, copy it
            esting people from around the company.               onto one of your home computers. Now, we can take data
               It’s  strange  how  fast  things  change.  My  grandfather   on our own mobile devices if we want. So, mobile devices
            worked for IBM in the 1960s. I saw him last weekend, and   aren’t a new data security threat.
            when I told him about this committee, he laughed. He said   Now that I think about it, maybe it isn’t what I’m tak-
            when he was working at IBM, he wanted to take an adding   ing out that’s a threat; maybe it’s what I’m bringing in. The
            machine home once. I guess all it did was to add and sub-  IS department doesn’t know what programs I’ve got on my
            tract; it didn’t even multiply. Anyway, he wanted to take it   mobile device. That must be why they want to “configure”
            home for the weekend to work on budgets, but to get it past   it. They want to see that I don’t have malware that could
            security on the way out of the build-
            ing,  he  had  to  have  a  permission
            slip  signed  by  his  boss  and  by  the
            facilities  department  head.  I  guess
            the  thing  weighed  40  pounds.  He
            said there was no way he could take
            a computer home then; it weighed
            a couple of tons and needed spe-
            cial power  and an air-conditioned
            room.
               “BYOD!”  he  said,  “They  want
            you to bring your own computer to
            work?  Crazy.  I  couldn’t  even  take
            an  adding  machine  out,  and  they
            want  you  to  bring  your  computer
            in?”  Then  he  asked,  “What  keeps
            you  from  taking  all  their  secret
            data?”
               “That’s  one  of  the  things  we
            talk about.”
               “I’ll bet you do.”
                                                                                             Source: Jérôme Rommé/Fotolia


            3 Bring your own device. From Chapter 4, pages 146–147.

        446
   473   474   475   476   477   478   479   480   481   482   483