Search
00
GBAF Logo
trophy
Top StoriesInterviewsBusinessFinanceBankingTechnologyInvestingTradingVideosAwardsMagazinesHeadlinesTrends

Subscribe to our newsletter

Get the latest news and updates from our team.

Global Banking and Finance Review

Global Banking & Finance Review

Company

    GBAF Logo
    • About Us
    • Profile
    • Privacy & Cookie Policy
    • Terms of Use
    • Contact Us
    • Advertising
    • Submit Post
    • Latest News
    • Research Reports
    • Press Release
    • Awards▾
      • About the Awards
      • Awards TimeTable
      • Submit Nominations
      • Testimonials
      • Media Room
      • Award Winners
      • FAQ
    • Magazines▾
      • Global Banking & Finance Review Magazine Issue 79
      • Global Banking & Finance Review Magazine Issue 78
      • Global Banking & Finance Review Magazine Issue 77
      • Global Banking & Finance Review Magazine Issue 76
      • Global Banking & Finance Review Magazine Issue 75
      • Global Banking & Finance Review Magazine Issue 73
      • Global Banking & Finance Review Magazine Issue 71
      • Global Banking & Finance Review Magazine Issue 70
      • Global Banking & Finance Review Magazine Issue 69
      • Global Banking & Finance Review Magazine Issue 66
    Top StoriesInterviewsBusinessFinanceBankingTechnologyInvestingTradingVideosAwardsMagazinesHeadlinesTrends

    Global Banking & Finance Review® is a leading financial portal and online magazine offering News, Analysis, Opinion, Reviews, Interviews & Videos from the world of Banking, Finance, Business, Trading, Technology, Investing, Brokerage, Foreign Exchange, Tax & Legal, Islamic Finance, Asset & Wealth Management.
    Copyright © 2010-2025 GBAF Publications Ltd - All Rights Reserved.

    ;
    Editorial & Advertiser disclosure

    Global Banking and Finance Review is an online platform offering news, analysis, and opinion on the latest trends, developments, and innovations in the banking and finance industry worldwide. The platform covers a diverse range of topics, including banking, insurance, investment, wealth management, fintech, and regulatory issues. The website publishes news, press releases, opinion and advertorials on various financial organizations, products and services which are commissioned from various Companies, Organizations, PR agencies, Bloggers etc. These commissioned articles are commercial in nature. This is not to be considered as financial advice and should be considered only for information purposes. It does not reflect the views or opinion of our website and is not to be considered an endorsement or a recommendation. We cannot guarantee the accuracy or applicability of any information provided with respect to your individual or personal circumstances. Please seek Professional advice from a qualified professional before making any financial decisions. We link to various third-party websites, affiliate sales networks, and to our advertising partners websites. When you view or click on certain links available on our articles, our partners may compensate us for displaying the content to you or make a purchase or fill a form. This will not incur any additional charges to you. To make things simpler for you to identity or distinguish advertised or sponsored articles or links, you may consider all articles or links hosted on our site as a commercial article placement. We will not be responsible for any loss you may suffer as a result of any omission or inaccuracy on the website.

    Home > Business > BYOD reduces CAPEX, but at what cost to security?
    Business

    BYOD reduces CAPEX, but at what cost to security?

    BYOD reduces CAPEX, but at what cost to security?

    Published by maria gbaf

    Posted on December 9, 2021

    Featured image for article about Business

    By Dave Waterson, CEO, SentryBay

    In the Autumn of 2020, Gartner described two technologies that would have a transformational impact on global businesses within the next 10 years. One of these was secure access service edge, and the other was Bring Your Own PC (BYOPC). Driven by the need to ensure remote workers could continue to be productive, enabling the use of their own personal device, whether through a BYOPC or Bring your own Device (BYOD) approach became essential.

    But as the modern workplace has altered and become more diversified, new approaches to technology and its usage must be backed up with an equally fresh approach to cybersecurity. The National Cyber Security Centre has recently updated its advice with regard to designing, implementing and managing IT configurations based on a BYOD model. The Centre issued a stark warning to companies – if you have given BYOD users admin access to company resources, revoke it immediately, then come back. What it means by this is that planning is needed for new BYOD deployments, and a quick fix will not be enough to stave off the cybersecurity risks.

    Keeping control of access

    There is no doubt that BYOPC and BYOD have helped many organisations to manage the cost and feasibility of connecting remote workers and stakeholders such as partners and suppliers. But in sacrificing full control of the device, CISOs need to armour their corporate networks so they do have full control over access, regardless of whether they are working virtually, on the cloud or on-premises.

    Unmanaged endpoints, or devices on which the security posture is not updated constantly, represent a threat. If they are compromised by malware or hackers, they are at risk of keylogging or screen scraping attacks which can capture confidential or sensitive data. Other malware uses browser attacks which aim to exploit the log-in process of remote access systems.

    As the use of BYOD grows, so too does the risk of attack. While it can be challenging for security leaders to control devices, and even operating system levels or application versions (including browsers) remotely, it is certainly not an impossible task. The best way to move forward is by deploying complementary layers of solutions and services that come together to deter threats.

    Most fundamental is the need for a zero-trust approach which should blanket the entire network and all endpoints that connect with it. It might seem extreme to treat all users (and their devices) as a threat by default, but it is the only way to ensure that they can be verified. It’s why the adage “Never trust, always verify” has become so significant.

    Taking a sophisticated approach

    CISO’s must also adopt more sophisticated strategies than internet security, anti-virus software and securing the wireless network with virtual private networking (VPNs). The past months have proven that with new ways of working, this old triumvirate is no longer enough to ward off attack and certainly each individual approach will not be sufficient.

    Our recommendation is that security leaders specify and deploy software and solutions that have been specifically designed to protect endpoints and work as part of a zero trust approach. They ‘wrap’ data and applications securely to counteract cyberattacks particularly from common threats including keyloggers, screen scrapers, browser-based attacks, file interception, RDP double-hop or VNC attacks.

    It’s important not to underestimate the impact of these attacks. Key logging and screen grabbing are widely used to access sensitive data. If a keylogger is installed on a remote endpoint device which has a lower security posture than it would have within a secure network, cyber-attackers can gain full access as the user logs-in and to everything the user enters at the keyboard or displays on the local device.

    For this reason security software that protects data entry on unmanaged devices, particularly those that work with remote access apps like Citrix, VMWare, WVD, web browsers and Microsoft Office applications, is vital as part of a comprehensive, layered approach when deploying or redeploying BYOD.

    The message is clear that BYOD needs careful consideration and planning. It is highly effective at reducing capital expenditure on devices and it impacts positively on the time and cost of maintaining equipment, but that should not be at the cost of security. Data must be adequately protected from the moment it is entered at the keyboard or on the screen to the moment it reaches its destination, regardless of who owns or manages the device or its location.

    By Dave Waterson, CEO, SentryBay

    In the Autumn of 2020, Gartner described two technologies that would have a transformational impact on global businesses within the next 10 years. One of these was secure access service edge, and the other was Bring Your Own PC (BYOPC). Driven by the need to ensure remote workers could continue to be productive, enabling the use of their own personal device, whether through a BYOPC or Bring your own Device (BYOD) approach became essential.

    But as the modern workplace has altered and become more diversified, new approaches to technology and its usage must be backed up with an equally fresh approach to cybersecurity. The National Cyber Security Centre has recently updated its advice with regard to designing, implementing and managing IT configurations based on a BYOD model. The Centre issued a stark warning to companies – if you have given BYOD users admin access to company resources, revoke it immediately, then come back. What it means by this is that planning is needed for new BYOD deployments, and a quick fix will not be enough to stave off the cybersecurity risks.

    Keeping control of access

    There is no doubt that BYOPC and BYOD have helped many organisations to manage the cost and feasibility of connecting remote workers and stakeholders such as partners and suppliers. But in sacrificing full control of the device, CISOs need to armour their corporate networks so they do have full control over access, regardless of whether they are working virtually, on the cloud or on-premises.

    Unmanaged endpoints, or devices on which the security posture is not updated constantly, represent a threat. If they are compromised by malware or hackers, they are at risk of keylogging or screen scraping attacks which can capture confidential or sensitive data. Other malware uses browser attacks which aim to exploit the log-in process of remote access systems.

    As the use of BYOD grows, so too does the risk of attack. While it can be challenging for security leaders to control devices, and even operating system levels or application versions (including browsers) remotely, it is certainly not an impossible task. The best way to move forward is by deploying complementary layers of solutions and services that come together to deter threats.

    Most fundamental is the need for a zero-trust approach which should blanket the entire network and all endpoints that connect with it. It might seem extreme to treat all users (and their devices) as a threat by default, but it is the only way to ensure that they can be verified. It’s why the adage “Never trust, always verify” has become so significant.

    Taking a sophisticated approach

    CISO’s must also adopt more sophisticated strategies than internet security, anti-virus software and securing the wireless network with virtual private networking (VPNs). The past months have proven that with new ways of working, this old triumvirate is no longer enough to ward off attack and certainly each individual approach will not be sufficient.

    Our recommendation is that security leaders specify and deploy software and solutions that have been specifically designed to protect endpoints and work as part of a zero trust approach. They ‘wrap’ data and applications securely to counteract cyberattacks particularly from common threats including keyloggers, screen scrapers, browser-based attacks, file interception, RDP double-hop or VNC attacks.

    It’s important not to underestimate the impact of these attacks. Key logging and screen grabbing are widely used to access sensitive data. If a keylogger is installed on a remote endpoint device which has a lower security posture than it would have within a secure network, cyber-attackers can gain full access as the user logs-in and to everything the user enters at the keyboard or displays on the local device.

    For this reason security software that protects data entry on unmanaged devices, particularly those that work with remote access apps like Citrix, VMWare, WVD, web browsers and Microsoft Office applications, is vital as part of a comprehensive, layered approach when deploying or redeploying BYOD.

    The message is clear that BYOD needs careful consideration and planning. It is highly effective at reducing capital expenditure on devices and it impacts positively on the time and cost of maintaining equipment, but that should not be at the cost of security. Data must be adequately protected from the moment it is entered at the keyboard or on the screen to the moment it reaches its destination, regardless of who owns or manages the device or its location.

    Related Posts
    Cybersecurity as a Profit Engine: Turning Financial Services Security into Measurable Business Value
    Cybersecurity as a Profit Engine: Turning Financial Services Security into Measurable Business Value
    How Investability Helps Companies Navigate Transformational Times
    How Investability Helps Companies Navigate Transformational Times
    88% of UK and US organisations concerned about state-sponsored cyber attacks as national threat levels surge, IO research reveals
    88% of UK and US organisations concerned about state-sponsored cyber attacks as national threat levels surge, IO research reveals
    One in three SME leaders do not fully understand cash flow, despite 82% facing cash flow problems
    One in three SME leaders do not fully understand cash flow, despite 82% facing cash flow problems
    Inside the Company that Predicted the Remote Work Mega-Trend Before It Became Mainstream
    Inside the Company that Predicted the Remote Work Mega-Trend Before It Became Mainstream
    SEO Consultant Adrian Czarnoleski on How to Increase Business Value Before Exit
    SEO Consultant Adrian Czarnoleski on How to Increase Business Value Before Exit
    No SOC 2, No Deal: Why You’re Already Losing Clients - and What You Can Do About It
    No SOC 2, No Deal: Why You’re Already Losing Clients - and What You Can Do About It
    Jose Tolosa Guides Organizations Forward with Clarity, Purpose, and Integrity
    Jose Tolosa Guides Organizations Forward with Clarity, Purpose, and Integrity
    Reducing Freight Costs to Drive Global Trade Expansion
    Reducing Freight Costs to Drive Global Trade Expansion
    The Psychology of Music in the Modern Workplace
    The Psychology of Music in the Modern Workplace
    Revealed: Low-Cost/No-Cost Marketing Hacks For Results Oriented Businesses
    Revealed: Low-Cost/No-Cost Marketing Hacks For Results Oriented Businesses
    Finance teams still stuck in spreadsheets as manual processes stall digital transformation
    Finance teams still stuck in spreadsheets as manual processes stall digital transformation

    Why waste money on news and opinions when you can access them for free?

    Take advantage of our newsletter subscription and stay informed on the go!

    Subscribe

    Previous Business PostTechnology trends to watch out for in 2022
    Next Business PostGlobal supply chains: three predictions for the future

    More from Business

    Explore more articles in the Business category

    The Future of Remote & Hybrid Leadership: Leading With Data-Driven Foresight

    The Future of Remote & Hybrid Leadership: Leading With Data-Driven Foresight

    2025-2030: The Next Technological Innovations for Business

    2025-2030: The Next Technological Innovations for Business

    The CFO’s New Playbook: 5 Ways AI Is Redefining Finance with Insights from Rishi Oberoi

    The CFO’s New Playbook: 5 Ways AI Is Redefining Finance with Insights from Rishi Oberoi

    Revolutionizing Payments: Secure, Scalable, Sovereign

    Revolutionizing Payments: Secure, Scalable, Sovereign

    Why Trademark Abuse in Paid Search Is a Growing Risk for Financial Institutions

    Why Trademark Abuse in Paid Search Is a Growing Risk for Financial Institutions

    E-commerce Customer Service: Tips

    E-commerce Customer Service: Tips

    When to Automate Your Warehouse: The Tipping Point for Operations Growth

    When to Automate Your Warehouse: The Tipping Point for Operations Growth

    Hurt at Work? 5 Financial Facts You Need to Know

    Hurt at Work? 5 Financial Facts You Need to Know

    Against the Odds: Resilience in Consumer Subsectors Offers Prime Opportunities for Investors

    Against the Odds: Resilience in Consumer Subsectors Offers Prime Opportunities for Investors

    Empower Your Workforce With Financial Wellness This Labor Day

    Empower Your Workforce With Financial Wellness This Labor Day

    Build a brand that stands out with five simple strategies, from defining your UVP to using storytelling and building loyalty. Find out more.

    Build a brand that stands out with five simple strategies, from defining your UVP to using storytelling and building loyalty. Find out more.

    The Hybrid Office Playbook for Financial Services: How to Design Hybrid Offices to Optimize People and Spaces

    The Hybrid Office Playbook for Financial Services: How to Design Hybrid Offices to Optimize People and Spaces

    View All Business Posts