Kazmarek

Free Site Analysis 1-858-952-5400
REMOTE ASSISTANCE
  • Home
  • OnGoing Management
  • IT Services
    • Microsoft 365, Exchange Services, and Consulting
    • Cloud Solutions
    • Virtualization
    • Mobility
    • Backup & Disaster Recovery
    • Server Installation/Migration
    • VoIP
    • Network & System Administration
    • Additional Solutions
  • Why Kazmarek
    • Case Studies
    • Testimonials
    • KTS Values
  • For Clients
    • O365 Log In
    • Client Portal
    • KTS Documents
    • SonicWALL VPN Client
  • News
    • Newsletters
  • Who We Are
    • Company
    • Team
    • KTS E-Award Winners
    • KTS Values
    • Charities We Support
  • Contact Us
    • Contact Us
    • Careers

Issue No. 126February 2023

The Danger of Uncontrolled BYOD

Many of our readers are familiar with the ongoing debate in Washington regarding whether the US Government should ban the popular social media app TikTok. Today we wanted to discuss a brief overview of that controversy, and why it is indicative of larger issues that any business owner should pay keen attention.

TikTok was originally released in 2016, and has steadily grown in popularity since. On its face, the app is similar in many ways to other social media apps of the recent past – it allows users to post short, time limited videos to be viewed by other users of the application. The main difference between TikTok and other popular social media apps is that it was made by ByteDance, a company based in China. Without getting into the larger geopolitical reasons behind their concern, the federal government, specifically the US Congress, has recently begun holding hearings to try to determine whether the app should be banned nationwide. The administration has already banned the app on government owned devices in use by federal government employees via executive order. The main cause for concern is that the app could be used by the Chinese government to both extract personal data on American users and potentially influence them via algorithmic video selection. Effectively, the US Congress is concerned that TikTok may be used to gather data on American citizens that could in turn be used to influence them in untold ways: spreading propaganda, influencing elections, steering them towards particular products, etc.

While passing judgement on the veracity of these claims is outside the scope of this discussion, they are illustrative of something that all business owners should be concerned about: the prevalence of end-user-owned devices inside a corporate network. Although TikTok is perhaps the highest profile example, the profusion of devices owned by employees that interact with the corporate network has grown exponentially in recent years. Cell phones, tablets, and smart watches all interact with the corporate network on a daily basis. Each of these devices represents a potential intrusion point. Malware on a mobile device can be used to extract data from that device, or from the network it is connected to. Mobile devices can also be utilized as infection vectors—installed malware may lie dormant on the device itself, only ‘activating’ once connected to a corporate network where it in turn wreaks havoc.

What then should a business do to guard against intrusions of this type? There are multiple means available – the simplest and most draconian is simply disallowing mobile device connections to a corporate network. Allowing these devices onto the network is sometimes referred to as BYOD (Bring Your Own Device). Many companies restrict their BYOD policy for this reason. Other methods include network segmentation, the usage of Mobile Device Management solutions, and conditional access policies that restrict the type of data available to employee devices. These restrictions and policies all require experienced IT professionals to implement and maintain. For more information on these or other IT related matters, please contact your IT services provider.

Article written by KTS Operations Manager, Tristan Collopy

Testimonials

Testimonials

“We’re building a solid IT foundation to be able to go where we need to be for growth and success. I couldn’t be more pleased with KTS’s performance and progress on our IT Projects.”

Shawn Ellis, CFO Custom Logos

Testimonials

“Both company email migrations have were completed without a problem. Thanks to your team both transitions went smooth.Everyone with your group are both knowledgeable and professional, and you should be proud of the organization you are building.”

John Sonnen, IT & Security Director Child Safety Network

Testimonials

“We have been using KTS for our IT support for about a year now, and we are very pleased with the service we have received. Chris has been our first line person, and has been able to resolve issues quickly, and often remotely, which helps reduce costs. Our staff has really appreciated his fast response and resolution to the issues that have come up. We have also appreciated that there are other folks at KTS who can fill in if Chris is out. Thanks to all!”

Suzy Halleland, Executive Administrator Village Church

Testimonials

“I think you know we have been very happy with your service and are very grateful to have been referred to you guys. But on a more personal note, I want you to know that Kevin in your office has provided a service for us that is way over the top.”

Jeff Golumbuk, CEO Custom Logos

Testimonials

“I just wanted to thank you and your staff for the excellent service and work provided by KTS.  It has been night and day compared to our old third party IT consultant.”
Nick Walters, VP Project Management West Coast General Corp.

Testimonials

“I wanted to let you know that I am absolutely delighted with the service we have received from you and your team so far. I know we put you in a tough position with such short notice of having to jump in and take over, and we really appreciated that. But there are many other reasons as well. First, I’m so glad they discovered the hard drive problem right away, as that could have caused us a huge issue as you well know. Second, everyone that I’ve had the pleasure to work wi… Read more
Jo Barsa, CPA Barsa & Company

Testimonials

“Kazmarek is fantastic!  I’ve used every size of IT company over the past 20 years and Kazmarek is by far superior to all I’ve used.  We are extremely happy with their service and expertise.  One of the things I like most about them is that they have engineers available to respond to our prioritized needs but they also wanted to give us the best customer service possible so they went above and beyond and put in place an escalation plan so that if I feel the response time i… Read more
Marisa Janine-Page, Partner Caldarelli Hejmanowski Page & Leer LLP

Testimonials

“I have thoroughly enjoyed working with the Kazmarek team through the years! They are responsive and have a great team to work with, whether it’s day-to-day IT needs or special projects. ”
KC Martin, HR Director Full Swing Golf

Testimonials

“As a local San Diego business, we were looking to partner with another local business after our IT needs just weren’t being met with a nationwide provider. We could not be happier with our decision since KTS has been very swift, attentive, and collaborative with our IT needs over the past three years. Their engineers, support desk, and managers are patient and able to effectively communicate issues and solutions to a layperson which speaks volumes about their hiring and customer… Read more
Carrie Lamb, Project Manager Chuao Chocolatier

When Was Your Last Backup?

When Was Your Last Backup?

If you don’t know, you’re not alone.
Find out more

Join Our Newsletter

Join Our Newsletter

Free On-Site Analysis

Free On-Site Analysis

Contact us to receive a 1-hour complimentary evaluation.
Learn more here.
  • This field is for validation purposes and should be left unchanged.

Copyrights: © 2023 Kazmarek. All rights reserved.

Designed by TinyFrog & N Halie Designs