1 / 10

Overview of BYOD Security Issues for Businesses

BYOD is a hot topic in today's workplace. Read this overview of potential security issues every business faces with BYOD policies. To learn more visit usainvestigators.com

Télécharger la présentation

Overview of BYOD Security Issues for Businesses

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. Did You Know? Why Security a key factor?

  2. BYOD – A Real Issue for Businesses BYOD stands for "Bring Your Own Device" to work and refers to employee use of their own personal mobile devices to perform company work activities. The BYOD phenomenon has raised serious questions about processes and data security that each business must address.

  3. The BYOD Challenge IT departments are facing the unprecedented challenge of implementing security procedures for the personal mobile devices of their employees. This is necessary in order to keep their networks safe from intrusion, and to protect company data from being stolen or lost.

  4. Smart Facts About BYOD • Nearly 80% of white-collar workers in the US use their own tablet or Smartphone for work. • 70% of mobile professionals will conduct their work on personal smart devices by 2018. • By 2016 worldwide shipments of smart phones will reach 480 million, and 65% will be used for BYOD

  5. Pros of Flexible BYOD Policies • Cost savings – companies don’t have to purchase mobile devices for employees • Increased employee satisfaction Cons • Potential Data Security Issues • Privacy Concerns

  6. Why Security a key factor? Effective tools for BYOD Security • Mobile device management (MDM) software is available for IT departments to use for securing BYODs. This software disables specific features of devices, like Bluetooth and Wi-Fi. It also enables companies to wipe stolen or lost devices. • Good Choices Include: • Exchange ActiveSync (EAS) • Microsoft Windows Intune

  7. Why Security a key factor? Issues with Lost or Stolen Devices Nearly 50% of non-IT employees do not have a passcode for mobile devices. The greatest impact on the security of mobile data is lack of employee awareness. This can be overcome by having an effective mobile security policy which includes enforcing strict passwords on BYODs.

  8. Why Security a key factor? Malware Threats From BYOD Did You Know? A lax BYOD policy may result in malware from employee’s personal mobile devices being introduced into your company network. Precautions • Limit access for mobile devices to necessary programs only • Monitor BYOD traffic to ensure that malware does not pass from BYOD to the corporate servers • Implement device enrollment programs

  9. For more information about BYOD issues, visit us online at usainvestigators.com or call us directly at 301-279-6700.

More Related