X
Innovation

BYO computers: cloud security risk?

Allowing staff to choose their own computer and smartphone rather than using the standard company roll-out will, in theory, help attract talented staff rather than corporate droids. But what about the security risks once the IT department loses control?
Written by Stilgherrian , Contributor

Play audio version

Allowing staff to choose their own computer and smartphone rather than using the standard company roll-out will, in theory, help attract talented staff rather than corporate droids. But what about the security risks once the IT department loses control?

Last week there was news from the US that back in 2008 the biggest security breach of military computers in their history could be traced back to a single unauthorised USB flash drive. Both unclassified and classified data networks were compromised, and Operation Buckshot Yankee was launched to clean them out.

Imagine the far bigger breaches that might be possible when compromised smart devices start hopping from network to network.

In Patch Monday this week, Stilgherrian discusses the security aspects of BYO computers with three Australian information security specialists. Paul Ducklin is Sophos' head of technology for the Asia Pacific region. Ajoy Ghosh is chief information security officer at Logica Australia. And Crispin Harris is the head of network security for a fast-growing Australian resources company.

They also discuss some of the potential legal risks of putting your data in the cloud — including the ease with which it could end up in a different legal jurisdiction.

Patch Monday also includes Stilgherrian's random look at some of the week's IT news headlines.

To leave an audio comment for Patch Monday, Skype to stilgherrian, or phone Sydney 02 8011 3733.

Running time 30 minutes, 26 seconds

Editorial standards