{"id":904,"date":"2020-06-04T20:18:54","date_gmt":"2020-06-04T20:18:54","guid":{"rendered":"https:\/\/securitycurve.com\/?p=904"},"modified":"2020-06-04T20:18:54","modified_gmt":"2020-06-04T20:18:54","slug":"since-when-are-byod-and-insecure-equivalent","status":"publish","type":"post","link":"https:\/\/securitycurve.com\/?p=904","title":{"rendered":"Since when are BYOD and &#8220;insecure&#8221; equivalent"},"content":{"rendered":"\n<div class=\"wp-block-image\"><figure class=\"alignright size-large\"><img decoding=\"async\" data-src=\"https:\/\/lh3.googleusercontent.com\/proxy\/Wg99ePduTTi0cyZoA8_cXlwi6uN-v2hwZOn75jvbNrjyZdKwS5BIBZSmv-1B4Wj-ov-mls49ueXldl-FVh8vDywJ1hDVCcoEjYUmbnoiC-mLi-ragDF3F6fM5thE27VojLEv_Ywsct_U9Wlbkd7NGkbhkr-0iw_qTmA\" alt=\"\" src=\"data:image\/svg+xml;base64,PHN2ZyB3aWR0aD0iMSIgaGVpZ2h0PSIxIiB4bWxucz0iaHR0cDovL3d3dy53My5vcmcvMjAwMC9zdmciPjwvc3ZnPg==\" class=\"lazyload\" \/><\/figure><\/div>\n\n\n\n<p>This morning I noticed an article from Infosecurity Magazine that referenced a study from CyberArk. The article <a href=\"https:\/\/www.infosecurity-magazine.com\/news\/employee-work-from-home-habits\/\">is here<\/a> so you can see it in context, but check this out:<\/p>\n\n\n\n<blockquote class=\"wp-block-quote is-layout-flow wp-block-quote-is-layout-flow\"><p>Employee work from home habits are putting businesses at a higher risk of cyber-attacks, according to a study by\u00a0<a href=\"https:\/\/www.cyberark.com\/\">CyberArk<\/a>. It revealed that a large proportion of remote workers in the UK regularly engage in practices including using unmanaged, insecure BYOD devices to access corporate systems (60%).\u00a0 <\/p><cite><a href=\"https:\/\/www.infosecurity-magazine.com\/news\/employee-work-from-home-habits\/\">https:\/\/www.infosecurity-magazine.com\/news\/employee-work-from-home-habits\/<\/a><\/cite><\/blockquote>\n\n\n\n<p>I wasn&#8217;t able to find a full survey report for this, but it seems like the data is coming <a rel=\"noreferrer noopener\" href=\"https:\/\/investors.cyberark.com\/press-releases\/press-release-details\/2020\/Remote-Work-Study-How-Cyber-Habits-at-Home-Threaten-Corporate-Network-Security\/default.aspx\" target=\"_blank\">from here<\/a>.  Now normally I don&#8217;t complain about this stuff &#8211; or rather I do but usually do it privately (with my indoor voice.)  I felt like this one was worth pointing out though because I&#8217;ve seen pickup of it around the trade press (both in Infosecurity and other places).  Which is that I&#8217;d debate whether the conclusions logically follow from the data points collected.     <\/p>\n\n\n\n<p>For example, there are a few assumptions in this that I&#8217;d question.  There&#8217;s the assumption that BYOD devices are by definition less secure (&#8220;77% of remote employees are using unmanaged, insecure \u201cBYOD\u201d devices&#8230;&#8221;)  To support the conclusion that BYOD &#8220;puts enterprises at risk&#8221;, the implication is that any BYOD must always be less secure than provisioned devices.  This has to be the argument for the conclusion to logically follow.  But I can cite numerous examples where it&#8217;s not the case.  For example, the use of my BYOD equipment two jobs ago (i.e. my laptop running a hardened virtual machine) compared to my provisioned desktop computer from 1996.  I guarantee you that the BYOD usage of those two is safer.  Now, I&#8217;m not saying it&#8217;s not possible, probable, or likely that BYOD tends to be less secure.  Could be.  But is it a valid assumption for this conclusion?  I really don&#8217;t think it is.     <\/p>\n\n\n\n<p>The second is the implication that Zoom and Teams are necessarily &#8220;insecure&#8221; due to having security vulnerabilities discovered recently (&#8220;66% of employees have adopted communication and collaboration tools like Zoom and Microsoft Teams, which have recently reported security vulnerabilities&#8230;&#8221;)  Sure, they have.  So have Microsoft Windows, Chrome, and VMWare and hundreds of other commonly-used software products across the same time period.  Are these technologies always insecure too?  If they are, there aren&#8217;t too many people out there writing about it.  <\/p>\n\n\n\n<p>Anyway, there&#8217;s other stuff to potentially nitpick at, but the reason why I even cared enough to write this in the first place is that I think people really are struggling with how their security models hold up in a remote-only context.  And many people are struggling with how to secure teleconferencing and equipment considerations and numerous other things.  I&#8217;m all about asking questions and gathering data, but I do think we need to be careful about the presuppositions that we bring to the table when analyzing the data.  <\/p>\n\n\n\n<p><\/p>\n","protected":false},"excerpt":{"rendered":"<p>This morning I noticed an article from Infosecurity Magazine that referenced a study from CyberArk. The article is here so you can see it in context, but check this out: Employee work from home habits are putting businesses at a higher risk of cyber-attacks, according to a study by\u00a0CyberArk. It revealed that a large proportion [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_et_pb_use_builder":"off","_et_pb_old_content":"","_et_gb_content_width":"","footnotes":""},"categories":[4],"tags":[],"class_list":["post-904","post","type-post","status-publish","format-standard","hentry","category-security"],"_links":{"self":[{"href":"https:\/\/securitycurve.com\/index.php?rest_route=\/wp\/v2\/posts\/904","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/securitycurve.com\/index.php?rest_route=\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/securitycurve.com\/index.php?rest_route=\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/securitycurve.com\/index.php?rest_route=\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/securitycurve.com\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=904"}],"version-history":[{"count":0,"href":"https:\/\/securitycurve.com\/index.php?rest_route=\/wp\/v2\/posts\/904\/revisions"}],"wp:attachment":[{"href":"https:\/\/securitycurve.com\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=904"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/securitycurve.com\/index.php?rest_route=%2Fwp%2Fv2%2Fcategories&post=904"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/securitycurve.com\/index.php?rest_route=%2Fwp%2Fv2%2Ftags&post=904"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}