136 ◾ Information Security Management Handbook
needs. And they are becoming so ubiquitous that organizations often do not even have to buy the
devices—employees are bringing their personal smartphones or tablets to work. Saying “no” to
business use of personal devices for accessing organizational information assets and systems may
no longer be an option and information security needs to adapt to how it protects organizational
information assets. Today’s growing demand for anytime, anywhere network access has expanded
to include the use of personal mobile devices such as laptops, tablets, smartphones, e-readers, and
more. is BYOD phenomenon is changing the way IT organizations and users address network
access security. For IT organizatio ...