With most organizations adopting mobile and implementing BYOD policies, how will the entry of the device and free WiFi-loving millennial employee affect security of critical data? A generation far more adept with newer technologies, millennials also pose greater cybersecurity risks with their preference of using the same devices for both personal and professional purposes.According to PwC, millennials will form 50 percent of the workforce by 2020. The cultural shift they bring to the table is also accompanied by an increased affinity towards newer devices that might lack security policies. This abandonment of caution in exchange for digital convenience brings several cybersecurity behavioral risks to the workplace.Surendra Singh, country director of Forcepoint says, “Millennials prefer to download unsecured third party apps, use unprotected public Wi-Fi to access work systems and accounts, and are not averse to sharing personal information.” SUBSCRIBE TO OUR NEWSLETTER From our editors straight to your inbox Get started by entering your email address below. Please enter a valid email address Subscribe Darshan Appayanna, chief information and knowledge officer of Happiest Minds Technologies, agrees and says, “They are more prone to being unaware of these risks especially on mobile devices because of their lack of awareness and a general assumption that anything available online is secure.” The eighth Global Information Security Workforce Study (GISWS) predicts a shortage of 1.8 million among cybersecurity professionals by 2022. The study further claims that millennials aren’t interested in this field. However, Venugopal N, head of pre-sales of Check Point Software Technologies, disagrees and believes that it is not just one generation alone which poses a risk to data security. “It is the technology that has evolved to an extent that it poses a greater risk than what the previous generations were using,” he says. “While an explosive proliferation of personal smartphones and tablets in the workplace exposes a company to increased risks, it is important to understand that standard security solutions are not strong enough to manage these devices and apps in the workplace,” adds Venugopal.This evolution expands the threat landscape, and the challenge is to control data as it moves in and out of the organization’s possession while millennials seek to use it on demand. Jayanta Prabhu, group CIO at Essar, agrees with Venugopal and adds, “The key is awareness and training, along with an explanation of why these security policies are important.” According to Fortinet’s latest threat landscape report, 25 percent of mobile devices in Asia contain some kind of malware. If devices are the problem, then are the risk factors of BYOD greater than its benefits?BYOD: It’s a catch-22 situationSimply put, “there is no way out,” says Prabhu. “If CIOs do not consider BYOD, then they will be in the same position as the CIO who stood in the way of the movement from the corporate desktop to the PC,” he says. According to Jaspreet Singh, partner – cybersecurity at EY, it is not easy for companies to adopt BYOD or forsake it. While the benefits include decreased IT asset expenditure, flexible workforce and higher productivity, the risk data being accessible to any third party could put a company in jeopardy.Rajesh Maurya, regional VP, India and SAARC at Fortinet believes that mandating staff to stop using non-sanctioned devices and applications is unlikely to stop their growth in the organization. “With the ubiquity of smartphones, employees are using social networks and their personal cloud apps whether your policies prevent it or not,” he says.The decision of BYOD being a boon or bane lies with an organization’s management of the environment. “It is imperative for security teams to have systems that can maintain visibility to understand employees’ behavior and intent into use of critical business data across all devices,” says Surendra Singh. Additionally, educating users and implementing effective technologies on data encryption, access control and traffic monitoring to manage the risks is way more effective.Learn, Segment, Protect Most companies do not dictate the types of allowed devices and this poses as a challenge as most security solutions lack the integration and visibility to span across so many devices. Maurya suggests a three step process – learn, segment and protect – to combat these threats.Jaspreet Singh advices upon two models that can be used to manage the mobile devices to bring to a BYOD environment – mobile device management tool and a cloud service. “The first helps the organization to fully control devices generally supported by APIs of smartphones used these days. The second allows a mobile device to access the service through an intermediary or broker controlling the delivery to the end user,” he adds.“Understanding millennials’ security practices will help organisations create security protocols and practices to not only detect and stop critical data loss but also take advantage of the skills they bring”Surendra SinghCountry Director, Forcepoint Striking the right balance between flexibilities of BYOD and mitigating risks is the key. According to Prabhu, BYOD policies at Essar extends beyond just IT to account issues associated with HR, legal and security. He adds that Essar controls data access, monitors usage of devices, and has a list of devices supported by the company.Adhering to this, both Mindtree and Happiest Minds also state that they have policies with respect to the type of devices and access, indicating that companies are growing to understand risks posed by employees who are now armed with no less than five devices. Are there specific technologies in place?A generation far more skilful with mobile devices, user behavior in millennials pose greater user-centric risks. Surendra Singh urges organizations to look beyond just IT. With a human-centric approach, the company aims to enable enterprises to better understand human behaviors and the intent that drives to protect employees as well as critical data.At Mindtree, the company has implemented a network access control (NAC) solution at LAN, WLAN and Internet layers to allow only pre-approved devices. Ramesh T. Kumar, general manager – corporate information systems of Mindtree says, “Endpoint posture checks are performed before admitting a device to the network, and various security agents are installed on these endpoints ensuring robust security.”While Kumar and Appayanna both acknowledge the presence of monitoring solutions that provide actionable insights against this particular threat, the latter says that they prove neither cost-effective nor straightforward enough to implement successfully. Instead, Happiest Minds has a comprehensive role-based identity management solution. “We also have taken a conscious call on the type of data allowed to be exposed to a localized group, to the enterprise and beyond,” adds Appayanna.Prabhu, Venugopal and Maurya recommend a multi-layered approach to the detection, assessment, and mitigation within the enterprise. “Given that millennials will do more on mobile devices than on standard laptops, it is pertinent to have a mechanism that will secure mobile devices in a corporate environment,” adds Venugopal.Without new approaches to data security, breaches and security compromises are likely to become more prevalent as more millennials join the workforce. “Understanding millennials’ security practices will help organizations create security protocols and practices to not only detect and stop critical data loss, but also take advantage of the skills they bring, revolutionizing the workforce for the better,” says Surendra Singh.But, millennials may be the road to a secured future for enterpriseWhile millennials might be the ones bringing in the chaos, it is evident that they are the ones the enterprise is looking to fall back upon as well. With a rise in cybercrime, a rise in the demand for a workforce with combat skill sets in the domain is inevitable.However, the eighth Global Information Security Workforce Study (GISWS) predicts a shortage of 1.8 million among cybersecurity professionals by the year 2022. Having surveyed 19,000 cybersecurity professionals, the study further claims that millennials aren’t interested in this field.Add to the fact that a large portion of the said domain will retire in the next decade, this is frightening. If leveraged and trained in the right skills, perhaps a 50 percent millennial workforce would be a boon after all? Related content feature Mastercard preps for the post-quantum cybersecurity threat A cryptographically relevant quantum computer will put everyday online transactions at risk. Mastercard is preparing for such an eventuality — today. By Poornima Apte Sep 22, 2023 6 mins CIO 100 CIO 100 CIO 100 feature 9 famous analytics and AI disasters Insights from data and machine learning algorithms can be invaluable, but mistakes can cost you reputation, revenue, or even lives. These high-profile analytics and AI blunders illustrate what can go wrong. By Thor Olavsrud Sep 22, 2023 13 mins Technology Industry Generative AI Machine Learning feature Top 15 data management platforms available today Data management platforms (DMPs) help organizations collect and manage data from a wide array of sources — and are becoming increasingly important for customer-centric sales and marketing campaigns. By Peter Wayner Sep 22, 2023 10 mins Marketing Software Data Management opinion Four questions for a casino InfoSec director By Beth Kormanik Sep 21, 2023 3 mins Media and Entertainment Industry Events Security Podcasts Videos Resources Events SUBSCRIBE TO OUR NEWSLETTER From our editors straight to your inbox Get started by entering your email address below. Please enter a valid email address Subscribe