Latest ICT trends and developments
BYOD smartphone

BYOD Risks & Rewards

How to keep employee smartphones, laptops 
and tablets secure

The first and best defense in securing BYODs (Bring Your Own Device) begins with the same requirements you apply to devices that are already on your network. These security measures include:

  1. Enforcing strong passcodes on all devices
  2. Antivirus protection and data loss prevention (DLP)
  3. Full-disk encryption for disk, removable media and cloud storage
  4. Mobile device management (MDM) to wipe sensitive data when devices are lost or stolen
  5. Application control

You should always extend encryption to both data in transit and data at rest. Protecting your devices with strong passwords means you make it incredibly difficult for someone to break in and steal data. But if somehow your device-level password is compromised, encrypting the data stored on the device provides a second level of security a hacker must get through in order to steal your data.

You should encourage users to think of the extra layers of security as helpful tools that give them the ability to use their own devices within the workplace. By password protecting devices, a user acknowledges accountability and responsibility for protecting their data.

In addition to applying passcodes and antivirus prevention to your devices, you should apply a custom level of application control to BYODs. If applications are available to employees on the internal network, they should be able to access them offsite through a VPN or email software.

A successful BYOD program allows your users to be productive outside of their scheduled work hours while also giving them the flexibility to do the things they like to do when they’re not working—like update their status or enjoy playing an interactive game.

Whatever decision you make for your BYOD policy, be sure that it’s enforceable and enables IT to deploy software remotely.

Let us assist you in BYOD security solutions:

Original article by Sophos

Comments (0)

Please login

You must be logged in to post a comment.

Cookie preferences

Our website uses cookies. Below, we briefly explain which cookies we use. You can choose not to allow the placement of analytical and/or marketing cookies. You can change your preferences at any time by clicking ‘Cookie Preferences’ in the footer of our website. You can also revoke or grant your permission(s) there. We store cookies to record your cookie preferences. More information about the cookies and the purposes for which specific cookies are stored, who stores these cookies (the provider), and the storage duration of cookies can be found in our Cookie Policy.

  • Always on

    Our websites cannot function properly without certain cookies. These cookies are necessary for the proper functioning of the website, to comply with the law (e.g. being able to demonstrate which cookie preferences you have set) or required for the security of our systems. You cannot disable these cookies.

  • These cookies, also known as statistical cookies, enable us to further develop and improve the functionality of our website by analysing the use of the website. These cookies send information back to our data analytics tools: Google Analytics from Google LLC or Hotjar from Hotjar Ltd.

  • Marketing cookies (tracking cookies) enable us to collect information about your internet behaviour. This allows us to tailor our online marketing campaigns and web content to your interests.