Skip to main content
  • Login
  • Subscribe
  • home
  • news
    • Daily News
    • Press Releases
    • Events
  • features
    • Expert Opinions
      • Executive Interviews
      • Opinion/byline
    • Analyst Comments
      • Executive Interviews
      • Opinion/byline
    • Videos
      • Executive Interviews
      • Product launches/Event coverage
      • Webinars
      • Video Tutorials
    • Blogs
  • taxonomy
    • cloud storage
    • storage and virtualization
    • Network storage
    • Data backup
    • Data Protection
    • Data storage management
    • Storage strategy
    • Big Data
  • research
    • Learning Guides
    • White Papers
    • Case Studies
    • Vendor Pages
    • Discussion groups

Advertisement Here

Advertisement

Looking for something else?

Search form

Home » Features »Analyst comments - Opinion/byline

How Snapchat Naked Pictures Highlight The Need For a Strong BYOD Policy

Oct 12, 2014
0
Keywords:
snapchat
BYOD policy
Snapchat images leaked
Data Protection

A couple of days ago it was discovered that hackers managed to intercept some explicit images that were sent through Snapchat, a social media messaging app very popular with teenagers aged 13 to 17. Snapchat users send photos and videos between contacts for a temporary period of time before they are automatically deleted. The Hackers proceeded to post the intercepted images online.

What is interesting about this particular scandal is that Snapchat officials claim that their “security was never breached”. Apparently the hackers managed to intercept the photos through third party apps that can retrieve data as it is sent to Snapchat. Third party apps can look extremely official and even carry the same theme as the app that they are trying to associate themselves with. These apps can fool, not only teens, but also the smartest of business people.

Snapchat condemns the downloading of these apps in their Terms Of Use and is constantly seeking them out and shutting them down on the appstore, yet the hacking of the explicit images still took place. We can draw a parallel between Snapchat and corporate IT as the snapchat central servers that were not breached can be compared to corporate IT servers. No matter how strong and secure your corporate IT security, the behaviour and actions of your users and the apps that they install can still make private data available to third parties.

This is why it is imperative that companies recognise the dangers of BYOD and understand the value of implementing a strong BYOD security policy that aims to limit and prevent the downloads of unsafe applications. Policies that control which apps are installed either by locking down devices or even by setting clear guidelines for users will help to minimise the threat.

There are many articles that go into detail on BYOD policy, it is not our intention to do that here. There are obvious steps that should be high on the list of considerations for any BYOD policy, including:

  • Categorize and segment your users.
  • Have a centralised management capability (e.g. to wipe sensitive areas of the mobile device from a central location.)
  • Use tools for access control and encryption.

Whilst all these tips and others are important, the lesson that can really be learned from this Snapchat incident is that it is essential to devise clear rules and guidelines on third party apps and communicate these to your users.

You might also like
  • Harnessing the Power of Data: Making...
  • The Data Protection as a Service...
  • The Opportunities Cloud Service...
  • Multiplied Innovation: Agility in...
  • Scale Is the Secret When IT Comes to...
Most comment
  • Facebook Acquisition of Oculus a Data Centric Opinion
  • AWS storms recovered with good DR
  • Harnessing the Power of Data: Making sense of the chaos with a comprehensive data strategy
  • Enterprise Systems' Jon Toigo Calls Out Storage Trends 2013
  • Vendor Independent Educational Sessions by SNIA Well Received
  • Joining the Dots to Solve the Security Puzzle
  • Forget BYOD according to IDC we need to think about CYOD or do we?
  • Its hybrid cloud only for HP Enterprise
  • The Data Protection as a Service (DPaaS) Market at a Glance
  • The LTO Program Update Making the Argument for Tape
share us your thought

0 Comment Log in or register to post comments

Tweet
Tweets by DSAnewsportal
Advertisement

Advertisement Here

Advertisement

  • Home
  • News
  • Features
  • Research
  • Bloggers
  • Big Data
  • Cloud Storage
  • Storage And Virtualization
  • Network Storage
  • Data Backup
  • Data Protection
  • Data Storage Management

  • Storage Strategy
  • Privacy
Copyright © 2021 Asia Online Publishing Group Sdn. Bhd. Reproduction in whole or in part is prohibited. Please send any technical comments or questions to our webmaster.