Subscribe / Unsubscribe Enewsletters | Login | Register

Pencil Banner

Bad bots on the rise: A look at mobile, social, porn, and spam bots.

David Geer | May 2, 2014
Bad bots create untold security nightmares for the enterprise. Today, we're taking a look at the trouble they lead to, and what companies can do about it.

"Our studies say that 50-percent or more of employees, especially younger employees, will ignore a policy that does not permit BYOD. They will try to connect their devices to the corporate network," says Henderson.

It's better to develop a proper BYOD policy and enforce it. It's easier to work with most employees, keeping them happy, and regulating what they can do while addressing a much smaller number of infractions. Then when someone doesn't agree to the policy or abide by it, the enterprise can block the device or sanction the user.

A typical BYOD policy that eases employee, device, and bad bot management permits a limited number of specified devices while requiring some combination of a suite of security software, NAC, and monitoring software. Many enterprises use containerization on the device or technologies that permit access only to a virtual image or representation of corporate data such that actual data never leaves the enterprise perimeter.

The enterprise should be able to satisfy employees who are concerned about data monitoring and privacy.

"Companies need to make it clear that while they have the ability to monitor personal Internet behavior, they don't collect that information or take any action unless there is a breach of corporate data," says Henderson.

 

Previous Page  1  2  3 

Sign up for CIO Asia eNewsletters.