Insights

Insights

⁣CYOD: a new workplace trend poses challenges to IT security

⁣More and more companies allow their employees to choose which IT device they want to work on. With this trend, after dealing with the challenges caused by remote work, the areas responsible for IT security face another difficult task. Meanwhile, users who tend to consider themselves invulnerable in cyberspace, continue to pose the greatest risk.

{{'2022-12-20' | formatDate}}

Zoltán Kovács

Services

⁣It doesn't matter what type of device we are talking about: although with a different approach, Macs need to be protected in the same way as Windows machines. The appearance of the former creates serious challenges in the corporate infrastructure, as managing them requires solutions different from the Windows practice. We also need system administrators who are comfortable in both environments of a hybrid infrastructure.

⁣Three out of four employees of large companies remain more loyal to their company if they can choose which computer they use, and 71 percent of them feel that their work is more efficient as a result of this step, according to research⁣ by the IT consulting company Wipro. PwC has come to a similar conclusion⁣: according to 78 percent of the respondents in its survey, work is much more efficient if the same technologies are available at work as at home.

⁣This is how the CYOD (Choose Your Own Device) approach is catching up with the BYOD (Bring Your Own Device) trend that is spreading as young generations start working.This already means perceptible competitive edge in the labor market: according to another Wipro research⁣, jobseekers will rather opt for the employer where they can choose their company IT work tool. As a result, it is no longer surprising that on an international level more and more companies allow their employees to use Macs in the typically Windows (or possibly Linux) company environment. Deloitte, for example, is already using ⁣more than a hundred thousand⁣ Apple devices in its internal operations, and at United States corporations almost every fourth machine runs macOS, according to 2021 IDC statistics.

⁣The appearance of Macs creates serious challenges in the corporate infrastructure, as their management requires different solutions than Windows machines. Also, it needs such system administrators who feel at home in both environments of a hybrid infrastructure. Because it is a misconception lacking any ground that malware and viruses are specific to Windows machines. It is a fact that less malicious software are written for macOS, but they pose the same risk as malware tailored to more widespread operating systems. It doesn't matter at all what type of device it is: they must be protected in the same way, albeit with a different approach.

⁣In the case of Macs, the first step is to disperse the myth of invulnerability cherished by some users, which feeds partly on the previously mentioned misconception and which lulls them into a false sense of security. This is a downright dangerous approach, as the users cherishing the illusion of invulnerability tend to sidestep those actions, with which they could improve their own security and consequently the security of the entire network.

⁣The weak points of a system that can most easily be compromised are the users themselves, who may leave open an unguarded "back door" into the network to be protected, due to a lack of knowledge or for reasons of convenience. For example, by bypassing the login process and connecting their device to the network to be protected in its "as is" state. Such situations can be avoided by preventing users from changing the security settings of their own wish and will. In the case of mobile devices MDM (Mobile Device Management) can be a good choice: the majority of these guarantee an adequate level of security - endpoint protection, keeping software versions up-to-date, protecting sensitive data - without compromising the user's private sphere.

⁣As an experienced digital service provider, Magyar Telekom not only provides assistance in establishing the standards for connecting to the company network, but also in "bringing" the IT equipment in such condition that meets these standards. In order for devices, manufacturers, products, and product families newly added to the existing infrastructure to be easily integrated, managed and used, it is worth starting to think long before the actual purchase decision is made.