100 likes | 263 Vues
BYOD is a hot topic in today's workplace. Read this overview of potential security issues every business faces with BYOD policies. To learn more visit usainvestigators.com
E N D
Did You Know? Why Security a key factor?
BYOD – A Real Issue for Businesses BYOD stands for "Bring Your Own Device" to work and refers to employee use of their own personal mobile devices to perform company work activities. The BYOD phenomenon has raised serious questions about processes and data security that each business must address.
The BYOD Challenge IT departments are facing the unprecedented challenge of implementing security procedures for the personal mobile devices of their employees. This is necessary in order to keep their networks safe from intrusion, and to protect company data from being stolen or lost.
Smart Facts About BYOD • Nearly 80% of white-collar workers in the US use their own tablet or Smartphone for work. • 70% of mobile professionals will conduct their work on personal smart devices by 2018. • By 2016 worldwide shipments of smart phones will reach 480 million, and 65% will be used for BYOD
Pros of Flexible BYOD Policies • Cost savings – companies don’t have to purchase mobile devices for employees • Increased employee satisfaction Cons • Potential Data Security Issues • Privacy Concerns
Why Security a key factor? Effective tools for BYOD Security • Mobile device management (MDM) software is available for IT departments to use for securing BYODs. This software disables specific features of devices, like Bluetooth and Wi-Fi. It also enables companies to wipe stolen or lost devices. • Good Choices Include: • Exchange ActiveSync (EAS) • Microsoft Windows Intune
Why Security a key factor? Issues with Lost or Stolen Devices Nearly 50% of non-IT employees do not have a passcode for mobile devices. The greatest impact on the security of mobile data is lack of employee awareness. This can be overcome by having an effective mobile security policy which includes enforcing strict passwords on BYODs.
Why Security a key factor? Malware Threats From BYOD Did You Know? A lax BYOD policy may result in malware from employee’s personal mobile devices being introduced into your company network. Precautions • Limit access for mobile devices to necessary programs only • Monitor BYOD traffic to ensure that malware does not pass from BYOD to the corporate servers • Implement device enrollment programs
For more information about BYOD issues, visit us online at usainvestigators.com or call us directly at 301-279-6700.