“Rezai says that the BYOD program is “not about [device] ownership, it’s about whether you’re doing business with Cisco.” So if you use a laptop or smartphone to conduct Cisco business, that device can be considered a target for discovery and forensics if relevant to litigation or an investigation. In effect, says Rezai, you may lose some of your personal data.”
“Only half of those who found one of the “lost” phones made any attempt to return it. And information on 96 percent of the lost phones was accessed by their finders.”
“A majority said their organization has appropriate policies in place to deal with data security concerns, and necessary steps have been taken to insulate IT networks and servers from cyber-attack. At the same time, CPAs were less certain about avoiding a data breach due to the loss of a laptop, tablet or other mobile device.”
“What’s more, companies now routinely permit employees to connect their personally owned smartphones and tablet PCs into company systems, creating myriad fresh pathways into corporate networks…. The Path revelation underscored how intrinsically porous services delivered to PCs and mobile devices from the Internet cloud can be. Cybercriminals, of course, long ago realized this and continue to take full advantage.”
Employees access social networks from both personal and company-owned mobile devices; is your organization prepared to incorporate mobile into incident response and digital forensics?