How to safely operate a bring your own device policy

Technology is growing by leaps and bounds and companies of every size are constantly looking for ways to leverage all of the benefits that these technological advances can bring them. It may not be cost effective for companies of any size to jump on every single new technological wonder, even when the price of technology is at an all-time low.

There is a way for companies to benefit from the latest and greatest technological gadgets without having to make any type of monetary investment. Portable devices are making their ways into the hands of people all over the world. Just about everyone has a smartphone, and tablet computers are quickly becoming the norm.

Many companies are choosing to adopt a ‘Bring Your Own Device’ policy in order to take advantage of these technological advances without incurring any type of costs, but there are security risks involved with a Bring Your Own Device Policy. Here are five things that companies can do to ensure their data does not end up in the wrong hands.

Know who is accessing data, and what devices they are using to do it

The very first step towards a successful ‘Bring Your Own Device’ policy is understanding what types of devices are being used to access data. It is also important to understand which employees are accessing which data.

A security audit is a great way for businesses to get a better understanding of exactly what types of devices are being used by employees to access sensitive corporate data. This will help a company determine exactly how to move on to the next step in securing their data in the mobile world.

Decide what data devices can access

The very first conclusion that many companies are jumping to is restricting access to corporate networks via personal devices. This is not the right choice. A security audit should have identified what types of devices are accessing the network.

The next step to properly protect data is to classify it and the networks that are being used to send and retrieve the data. By classifying data, businesses will be able to get a much better look at the areas that need protection, and the areas that do not. Once the data has been classified it will be much easier to see the bigger picture. Companies will be able to set forth a policy that allows certain groups of people access to certain areas of data.

Identify problem apps

Not every app will play nice. Some apps have been known to have huge security vulnerabilities. These apps, without notice to the user can copy and send address lists and personal photos through the corporate network.

The two most popular mobile device operating systems are both guilty of these two examples. iOS which powers Apple devices, and the Android operating system have both been known to have these same security problems. Once the problem apps are identified, they can be prevented from being installed through company networks. Another solution is to restrict app downloads to a company approved app market place.

Create company policies to help reduce mobile security problems

Once these other issues have been addressed, companies will need to create strict policies that will teach employees what can and cannot be done with their own devices on a company network. If an employee uses their own mobile device to conduct work in the work place, a strict policy should dictate what he or she can or can’t do with the device. These policies must also have strict repercussions for any employee that chooses to violate them.

Enforcing policy with software

A security key on a keyboardThere are several solutions on the market that can and will help corporations manage all of this information. These resolutions are called Mobile Device Management Solutions. These types of solutions will allow corporations to enforce the policies that have been set during all of the previous steps.

A mobile device management solution will protect data, manage apps, address mobile device security, protect content, and protect emails. A mobile device management system will also be compatible with every major mobile device operating system on the market.

Allowing employees to use their own portable devices should not present a security breach to any company regardless of its size. Proper planning will always be the best way to prevent any sort of problems.

3 thoughts on “How to safely operate a bring your own device policy

  1. What good advice! I’ll be sure to send over this article to my company’s IT department. They are toying with the idea of implementing a BYOD policy.

  2. An add on trend in deploying various security policies on BYOD could the use of SDNs i.e. software defined networking, which allow the network configuration with a software only. All the networking nodes dependencies are taken off, which allows the absolute customization of network services through a software only and this trend can definitely contribute in operating various security policies in BYOD.

    Some security concerns in BYOD are explained.

Leave a Reply

Your email address will not be published. Required fields are marked *