Cyber security in the age of BYOD

From phishing and botnets to malware and rogue software – cyber criminals are spoiled for choice when it comes to how they can infiltrate corporate networks. And while mobile device policies like Bring Your Own Device (BYOD) have their advantages, businesses are actually giving sinister characters more opportunities to access network resources.

By allowing employees to move around with business data on their personal devices, organisations are essentially making it more difficult for IT managers to maintain control.

Consider these stats based on research from Symantec:

  • 50% of businesses consider cyber security to be a top priority IT initiative.
  • When it comes to emerging technologies, mobile proved to be an area of high concern for modern business execs.
  • Most businesses believe that continuous monitoring would have the greatest impact on their company’s cyber posture.
  • More than half of businesses believe that personnel and training are key security concerns.

So, what should IT managers be doing to implement BYOD securely? Here are a few tips:

Limit: In order to enjoy the benefits of BYOD without wanting to up your risks businesses need to set some boundaries. This means limiting concurrent logins, as well as restricting access based on device. All of these strategies safeguard the business’ sensitive information from being lost should an employee’s device go missing.

This should all be detailed in your comprehensive BYOD policy, which is communicated with all employees. If you want to have a secure working environment in which employees can use their own devices, you need to ensure that all restrictions, and the reasons behind them, are absolutely clear.

Monitor: It is essential to keep track of and authorise all the devices accessing your network so you can monitor which devices belong to which users. This makes it simpler to restrict access should an employee leave the business, for example. Getting this right requires close collaboration with your HR department.

Respond: The purpose of the above points is so that you are well positioned to respond if, and when, something goes wrong. With real time monitoring, business leaders can be alerted should any suspicious activity occur.

We all know about the benefits of implementing BYOD. But to enjoy the benefits without the potential risks, businesses need to have the right security measures must in place. Keen to learn more about different mobile deployment models and how to find the right fit for your business? Check out our monthly newsletter by signing up below.

Similar Blog Posts