68 | WEAR YOUR OWN | EDUCATIONAL TECHNOLOGY
W:
www.universitybusiness.co.uk | T: @UB_UK
should always be strongly considered with the work side being properly protected." Curran advocated making sure students are fully
aware of campus IT protocol. “Even with the best intentions it is human nature that this will not be 100% eff ective, but it is important to make students aware of security protocol at the earliest possible opportunity.” Curran recommends the introduction of staff and
student rules that include addressing specifi c situations. For example, if a device goes missing for whatever reason, the owner should report it and all relevant passwords changed. If a wipe is needed it should be built into the rules and known from the moment staff and students join a network. In addition, he strongly advocates good planning. The potential for fi nancial, legal and reputation damage
"THE SHEER NUMBER OF DEVICES FLITTING ON AND OFF NETWORKS PRESENTS OTHER DATA MANAGEMENT PROBLEMS"
is too high not to have robust policies, standards, procedures or technology functions, and monitoring in place. At the earliest opportunity everyone who uses a system should be made aware of the importance of protocol and their responsibilities. According to Enni Carboni, Executive Vice President
of customer solutions at Ipswitch, all wearable devices should be run through a security protocol. He also said the inevitable proliferation of wearables will also raise other concerns. The sheer number of devices fl it ing on and off networks presents other data management problems. Data loads have to be monitored, and in order to avoid bot lenecks it means bandwidth has to be tracked. But this is true of smartphones, tablets and laptops.
Scare stories
Bob Tarzey, who has special focus on IT security and network systems management at IT research and analysis company Quocirca, believes that many people are overreacting to media scare stories. “I suspect over- excitement by the press is hyping this subject up. There is no need to panic. So far the sales of wearables are low, and good BYOD policies should be enough,” said Tarzey. “Recording or uploading information onto a personal archive or Dropbox is just as likely to happen with BYOD as with wearables. The diff erence is that with a camera its is obvious what someone is doing and with s no
glasses it's not, but if people are intent on malicious behaviour there is not much that can be done once they have access to whatever it is that is of interest.”
Tarzey recommended that managers ensure current BYOD rules are robust, and monitor closely
enabling any changes based on solid existing procedure.
The two points most parties agree on are preparation and planning, even if no immediate steps are taken. “Planning early even if action is not necessary is important,’ said the University of Ulster’s Kevin Curran. “This not only involves systems, but also training. Any technical preparation should be
matched by the preparation of relevant personnel.”
Nobody disputes that WYOD will at some stage become popular to the point of being ubiquitous. How wearables will develop, and what security challenges will look like in the future are a
mat er of speculation. The minimum recommended response to the current situation with WYOD is ensuring protocol on BYOD is robust, and that staff and students are made aware of rules and responsibilities. Beyond this there is no accepted course of action. Watch this space for developments. UB
nd t
Page 1 |
Page 2 |
Page 3 |
Page 4 |
Page 5 |
Page 6 |
Page 7 |
Page 8 |
Page 9 |
Page 10 |
Page 11 |
Page 12 |
Page 13 |
Page 14 |
Page 15 |
Page 16 |
Page 17 |
Page 18 |
Page 19 |
Page 20 |
Page 21 |
Page 22 |
Page 23 |
Page 24 |
Page 25 |
Page 26 |
Page 27 |
Page 28 |
Page 29 |
Page 30 |
Page 31 |
Page 32 |
Page 33 |
Page 34 |
Page 35 |
Page 36 |
Page 37 |
Page 38 |
Page 39 |
Page 40 |
Page 41 |
Page 42 |
Page 43 |
Page 44 |
Page 45 |
Page 46 |
Page 47 |
Page 48 |
Page 49 |
Page 50 |
Page 51 |
Page 52 |
Page 53 |
Page 54 |
Page 55 |
Page 56 |
Page 57 |
Page 58 |
Page 59 |
Page 60 |
Page 61 |
Page 62 |
Page 63 |
Page 64 |
Page 65 |
Page 66 |
Page 67 |
Page 68 |
Page 69 |
Page 70 |
Page 71 |
Page 72 |
Page 73 |
Page 74 |
Page 75 |
Page 76 |
Page 77 |
Page 78 |
Page 79 |
Page 80