Home WINDOWS HOW-TO What is Bring Your Own Network (BYON)?

What is Bring Your Own Network (BYON)?

What is Bring Your Own Network (BYON)?


We live in an era where enterprise IT is still struggling to adapt to the bring your own device or BYOD model into the secure arena. In our article on BYOD implementations, we talked about two possibilities: one when employees use company-owned devices and another when organizations use employee-owned devices. Security concerns are greater in the latter case, where employees may not agree to censorship when they are not in the office. Therefore, instead of the office network, they start using their own network. And they also bring their own networks into the office. How will this affect the safety of companies? This article discusses what is Bring Your Own Network or BYON and how does this affect business security?

What is “bring your own network” or “BYON”?

BYON means “bring your own web.” To save money and increase employee privileges, some organizations allow their employees to use their own network in the office. Official networks and VPNs are usually designed in such a way that people working in an organization using those networks cannot access certain websites, which can degrade performance. But in what seems to be the latest trend, startups and similar organizations don’t provide their employees with any network or VPN. Instead, they pay for the network that the employee uses to connect and use the Internet or intranet. Or, in some cases, both the local organizational network and the employee’s data carrier are present.

An organization’s network can be used to access data related to that organization while the storage medium is used for something on the Internet. If an intranet is involved, the employee can use their own storage medium to log into it.

A third kind of network can also be envisioned here. The mobile device can be configured as an access point, and other mobile devices connect to the Internet or intranet using this access point. When I write this article, I do not fully understand the BYON concept as it is a major security issue for me and not any employee benefit or savings for organizations. It would be much better to let the employee use the organization’s network to view what he or she wants instead of allowing them to use their cellular data or Internet key to access the Internet. At least that is not how the secrets of the company will be revealed.

BYON security risks

In a world where the Internet has become a hub for finding information, there are many methods that are being developed every day to “get” people to reveal their personal information. You know about phishing. You also know about social engineering. In the case of phishing, cybercriminals try to collect your personal data using various decoys. In social engineering, a criminal befriends one or more of your employees and begins to “extract” data related to your organization. That is, when taken together, both methods – if one of your employees falls for the bait – can have disastrous consequences for your organization.

Not only that, using cellular data for organizational work can create another problem. There is no guarantee that the connection between your employee’s mobile device and the website he or she visits is encrypted. Without encryption, attackers can easily check what data is being transferred and how to use it to their advantage. Once they hit an intranet where someone logged in using their cellular data, such as no encryption, they could give out their login credentials to someone tracking your organization. At the same time, the confidentiality of your data depends on the extent to which an employee can access your database.

How can it be implemented – Make the Employee responsible

At the moment, the only methods different organizations use to implement BYON are:

  1. Inform the employee about the risks of using your own Internet connection.
  2. Making an employee responsible for any data breach

The second is a big threat to people in your organizations, and they would rather use the corporate network. This means that you must provide them with a local area network that they can use with their networks while they are at the office. They may use cellular networks – with care – for other work, such as free time browsing.

In my opinion, the whole BYOD practice is inappropriate as it allows employees to take organizational data home. Add to this that if an organization allows its own networks for BYOD, the situation could explode the entire confidentiality of the organization’s data at any time. This is a ticking bomb, and as seen in recent data breaches, a simple mistake on the part of an employee can be a terrible loss for the entire organization.

Other problems with BYON

Among the many other problems associated with Bring Your Own Network, IT cannot set up employee networks; no employee would agree to this if it included censoring certain websites.

IT helpdesk cannot troubleshoot employees’ own networks as they can be associated with different storage media. For troubleshooting purposes, the employee will need to call the data service provider they are using. Alternatively, it would be possible to provide all employees with a plan for a single storage medium, but I do not know how feasible this is. Almost everyone has their favorites, so some may not agree to change their service provider.

It would be difficult to track which employee is using which resources on the company’s internal network, if any. The responsibilities of employees will be limited, as there will be no reliable methods that would allow the administrator to find out whose negligence led to the data breach. An organization may have to plan for this in detail before moving to BYON.

These are my own views on what BYON is, what the security issues come with, and how to implement it when needed. I don’t think BYON is needed unless you want your employee to play some online game in the office. But this is my own point of view.

I will be glad to know your opinion, which means I will wait for your comments.


Source link



Please enter your comment!
Please enter your name here