In the BYOD era, think clothing and home security: layers are best.

Posted: May 14, 2014 in Uncategorized
Tags: , , , , , ,
BYOD Bring your own Device Tablets Icon Cloud and
About a year ago, Stanford University’s information systems (SUNet) suffered a sophisticated and serious breach evidently originating from a quasi-governmental entity in Asia, according to the May/June issue of Stanford Magazine. It was a first for Stanford and, from all accounts, it was the cyber equivalent of the Loma Prieta 1989 earthquake. It penetrated the core of SUNet’s authentication systems. Yes, this was serious.

Fortunately thus far for Stanford and its SUNet users, there’s been no evidence of compromises to personal information such as Social Security and credit card numbers, or personal health information.

“But the attack shook us up,” said Stanford’s Randy Livingston, vice president of business affairs.  When you consider that campus operations involve more than100 merchants who accept credit cards, you can appreciate Livingston’s post-traumatic stress.

In fact, Stanford is not alone among American universities incessantly subjected to attacks that are made all the more harrowing and potentially disastrous due to the rampant BYOD culture of college campuses. Not to mention the inherent resistance to the BYOD mandates so common among businesses today. There’s no way to prevent security breaches, of course, especially when they’re conducted by forces at the governmental level.  Still, in the post-BYOD era, layered security is the best bet. It’s useful to think home security here, where we have alarm systems and locks on our doors and windows. It’s not an either/or, it’s both. And then some.


When he’s not ranting on this blog, Stan DeVaughn oversees customer development and marketing at RightOn Mobile, a BYOD security start-up in stealth mode, and collaborates with agency partner Peter Davé at Write Angle, Silicon Valley’s premiere content-development specialists for the tech industry.


Leave a Reply

Fill in your details below or click an icon to log in: Logo

You are commenting using your account. Log Out /  Change )

Google+ photo

You are commenting using your Google+ account. Log Out /  Change )

Twitter picture

You are commenting using your Twitter account. Log Out /  Change )

Facebook photo

You are commenting using your Facebook account. Log Out /  Change )


Connecting to %s