ARTICLE
10 November 2020

Cybersecurity Threats In 2020 Now Include Choose-Your-Own-IT (CYOIT)!

FL
Foley & Lardner

Contributor

Foley & Lardner LLP looks beyond the law to focus on the constantly evolving demands facing our clients and their industries. With over 1,100 lawyers in 24 offices across the United States, Mexico, Europe and Asia, Foley approaches client service by first understanding our clients’ priorities, objectives and challenges. We work hard to understand our clients’ issues and forge long-term relationships with them to help achieve successful outcomes and solve their legal issues through practical business advice and cutting-edge legal insight. Our clients view us as trusted business advisors because we understand that great legal service is only valuable if it is relevant, practical and beneficial to their businesses.
Darkreading.com reported that "one trend the pandemic highlighted was the relatively quiet shift to a choose-your-own-IT (CYOIT) model. Unlike bring-your-own-device (BYOD)...
United States Technology

Darkreading.com reported that "one trend the pandemic highlighted was the relatively quiet shift to a choose-your-own-IT (CYOIT) model. Unlike bring-your-own-device (BYOD) -- a term generally used to describe self-owned mobile devices -- CYOIT encompasses a broader range of tools that workers use to do their jobs."  The November 3, 2020 report entitled "6 Cybersecurity Lessons From 2020" included comments about CYOIT:

With BYOD, the major worry was corporate data ending up on a device where the organization had no footprint and no security stack on the device,...

Though BYOD created problems, IT still had control over the server side and could therefore enforce which apps could be used.

With CYOIT, users can choose different cloud-based apps -- for example, accessing their work email via Gmail or using Zoom and Webex, among other things...

CYOIT puts more pressure on organizations to focus on the data.

If you can't control the hardware or the apps, you [need to] have the controls travel with the data,...

Here are all 6 lessons:

#1 Security Operations Centers Need Recalibration

#2 Choose-Your-Own-IT Has Become a Thing

#3 SaaS Has Become a Bigger Attack Target

#4 Zero-Trust Initiatives Are Gaining Traction

#5 Ransomware Raises New Management Issues

#6 Nonsecurity Events Can Have a Big Impact on Security

No surprises in this report!

The content of this article is intended to provide a general guide to the subject matter. Specialist advice should be sought about your specific circumstances.

Mondaq uses cookies on this website. By using our website you agree to our use of cookies as set out in our Privacy Policy.

Learn More