BYOD: Managing and securing your mobile workforce

More work is being completed via mobile device. Are your employees using their devices safely? If not, there may be consequences.

byod-form-shutterstock-gustavo-frazaojpg-copy.jpg

Image: Shutterstock/gustavo-frazao

We use our mobile devices for everything. Whether we’re ordering takeout or communicating with our loved ones, our mobile devices handle it all. It’s for this reason that mobile device usage continues to grow across the globe.

According to data presented by Stock Apps, the number of people using mobile phones hit nearly 5.3 billion in July, which is 67% of the world’s population. This number is even higher when you drill down into users who are simply using some form of connectivity, including Internet of Things (IoT). Between June 2020 and July 2021, this number rose to 10.4 billion globally.

A large contributing factor in the growth of mobile device usage is the effort businesses are putting forth to make remote work a continued possibility for their employees. This includes allowing employees to use their own devices to access company data.

Unfortunately, more mobile devices on your network can lead to serious cyberattack threats without heightened security measures.

More devices = more threats

Enjoying this article?

Download this article and thousands of whitepapers and ebooks from our Premium library. Enjoy expert IT analyst briefings and access to the top IT professionals, all in an ad-free experience.


Join Premium Today

Bring-your-own-device (BYOD) practices are becoming increasingly popular for businesses—and for good reason. For example, BYOD practices provide cost savings for employers looking to cut costs. According to a study by Repsly and HubSpot , a company with 500 employees could see $1.5 million in savings per year by implementing a BYOD practice.

Of course, more employee devices on your network leads to serious security challenges. For example, personal apps could intermingle with business data stored on your employee’s device. If that app is hacked, so is your data. 

Another issue lies within the management of these devices. Your IT team should be able to quickly revoke access or be alerted when security concerns arise. This can be difficult when personal devices are involved.

It’s true that each mobile device has a certain level of built-in security to ward off cyberattacks. However, it’s not enough. There’s an industry-wide need for a better solution for protecting devices from cyberattacks—and some organizations already have solutions in the works.

Researchers at the University of Missouri’s College of Engineering recently received a two-year, approximately $500,000 cybersecurity research grant from the NSA to develop a flexible, add-on security feature that allows different types of smart devices to learn from past attacks. The solution will also require minimal need for human intervention and include a collaborative network for the developers of mobile devices. As a result, they may share solutions to better respond against future attacks.

Appropriate mobile device use for employees

Until the brilliant minds at the University of Missouri complete their research and a solution is finally released, businesses must rely on available security measures. This includes educating employees on what’s appropriate and what isn’t when it comes to BYOD usage.

For example, employees should not:

  • Use personal or recreational apps while connected to company networks
  • Attempt to change or disable device security settings set by the IT department
  • Discard previously authorized devices until the IT department decommissions them

It’s not enough to rely on the security built into each device, nor is it enough to hope your employees use their heads when it comes to mobile security. Instead, businesses must take action to prevent data from falling into the wrong hands. These TechRepublic Premium resources can help.

Each personal device should be approved for business use before any data is shared. A BYOD Approval Form ensures your employees understand the risks and obtains their acknowledgment of your policies before approval. This sample form will get you started in developing your own.

View at TechRepublic Premium

For proper security, you must establish guidelines for the usage and control of all employee devices, including what these devices can access. You and your employees should also understand the necessary steps to take in the event of loss, theft, or employment termination. This BYOD Policy describes these steps in detail as well as employee responsibilities.

View at TechRepublic Premium

The same heightened security measures must be put into place for company-owned devices too, including laptops, tablets, and phones. This Mobile Device Security Policy includes steps you and your employees should take to secure these mobile devices and prevent data loss in the event of loss, theft, or breach. And it’s customizable to fit your business needs.

View at TechRepublic Premium

Quality mobile security starts with your employees and IT department understanding the right and wrong way to use mobile devices for work. This Mobile Device Computing Policy includes stipulations for both company and employee-owned devices and requirements for users and IT departments responsible for provisioning and managing mobile devices.

View at TechRepublic Premium

Stay connected with us on social media platform for instant update click here to join our  Twitter, & Facebook

We are now on Telegram. Click here to join our channel (@TechiUpdate) and stay updated with the latest Technology headlines.

For all the latest Technology News Click Here 

 For the latest news and updates, follow us on Google News

Read original article here

Denial of responsibility! TechiLive.in is an automatic aggregator around the global media. All the content are available free on Internet. We have just arranged it in one platform for educational purpose only. In each content, the hyperlink to the primary source is specified. All trademarks belong to their rightful owners, all materials to their authors. If you are the owner of the content and do not want us to publish your materials on our website, please contact us by email – [email protected]. The content will be deleted within 24 hours.