Mobile device security: Rewards outweigh risks

See why one CIO believes that mobile device security concerns are covered by VDI -- and are a ruse for some IT professionals to hide behind.

Niel Nickolaisen, CIO, Western Governors UniversityNiel Nickolaisen, CIO
Western Governors University

I don't want to upset anyone or give the impression that I am off base or naive or somewhere in between, but it

seems that VDI, bring-your-own-device and mobile device security should not be that big of a concern.

Stated differently, are security concerns about a virtual desktop infrastructure (VDI) and mobile devices the last refuge of the scoundrel?

Perhaps the story of my VDI/bring your own device (BYOD) project will explain why I ask this question.

Over the years, I have tried various ways to balance uptime, service levels and customer satisfaction. I was an early adopter of the managed desktop concept. While I loved the service levels associated with almost immediately getting a customer up and running after a hard drive failure, my customers hated not being able to install software or save anything to their hard drive. When desktop virtualization came along, I decided not take an immediate plunge, but first experimented to see if it really offered the balance between operational excellence and customer service.

Our first experiment involved members of the IT staff. We purchased a couple of tablets and worked out the VDI issues -- which were numerous. At its core, VDI shifts the computing power from the device to somewhere else. This shift puts additional load on the network connection and the data center. From our experiment, we learned that some of our locations were VDI-capable while others were not. Knowing this set us up for our second experiment: unleashing VDI on a group of customers.

More on mobile device management

Evaluating mobile device management products: Seven categories

A CIO's guide to mobile device management in the workplace

Balance business and IT when creating a mobile device management policy

For our customer experiment, we had a ready and willing pilot group. Many members of our staff already had tablets and wanted to do something with them besides play Angry Birds during boring meetings. We selected 50 volunteers and deployed to them a virtual desktop. This experience went well enough that we quickly expanded the pilot.

This experiment worked so well that some people on my staff -- the "scoundrels" who seek refuge -- could sense us trending toward a BYOD policy and imagined the big changes that would make their skills less necessary (much less device configuration, management and computer break/fix). With bring your own device becoming more of a reality, they raised concerns about BYOD and mobile device security. The same people who did not think that security on a laptop -- which can actually hold a whole bunch of sensitive data -- was too big of a deal were suddenly experts on the security risks of tablets and smartphones. Since VDI shifts data to the data center or cloud and behind our traditional, tested and proven security systems, it is likely much more secure than on the laptop or PC that the BYOD device replaced.

As with all things security, I have found it is good to assess the risks before implementing policies and technologies.  Let's start with the sensitivity of our data. The most sensitive information on my device is the salary information of my staff and the status of my projects. If someone unauthorized gets a hold of this data, it might be embarrassing to me and others but will not hurt my organization. If someone hacks into my smartphone and reads my email, I suspect they will feel sorry for me rather than get some juicy competitive information. My risk assessment considers the types of information retained on a BYOD device and the sensitivity of that data. In all but a few cases, the risk is pretty low.

So, don't let the scoundrels with concerns about security slow down your VDI, BYOD and mobile strategies and projects. The advantages far outweigh risks. And, as the devices get smarter, someone will develop enough mobile device security measures to satisfy the need. This allows you to be more strategic, innovative and rational.

Niel Nickolaisen is CIO at Western Governors University in Salt Lake City. He is a frequent speaker, presenter and writer on IT's dual role in enabling strategy and delivering operational excellence. Write to him at nnick@wgu.edu

This was first published in October 2012

Dig deeper on Mobile technology and management

Pro+

Features

Enjoy the benefits of Pro+ membership, learn more and join.

Related Discussions

Niel Nickolaisen asks:

Does VDI make mobile device security a nonissue?

0  Responses So Far

Join the Discussion

8 comments

Oldest 

Forgot Password?

No problem! Submit your e-mail address below. We'll send you an email containing your password.

Your password has been sent to:

SearchCompliance

SearchHealthIT

SearchCloudComputing

SearchMobileComputing

SearchDataCenter

Close