Keeping tabs on your employees in a multi-device environment

The traditional desktop computer is no longer the only device we use to get work done. For the past few years workers have increasingly begun to use their own smartphones and tablets for work. According to a study carried out by Tech Pro Research, 74% of businesses allow, or are planning to allow, their employees to bring their own devices to the office.

Despite the benefits, such as being able to communicate easily with employees when they aren’t at their workstations, security remains a priority and with the BYOD (Bring Your Own Device) culture – it is important to stay on top of it.

The variety of devices used in the workplace and the resulting loss of control held by the business, means that cybercriminals are able to take advantage of the many vulnerabilities in mobile devices to access the company’s network.




Tips on how to secure BYOD within a Company

  • Assign someone to be in charge of managing the devices

    You need to give the responsibility to a member of the IT department to make it easier to control. If your company is small, you can contract an external service.

  • Give support to all platforms possible

    The IT department of the business has to guarantee technical support for all devices used by employees so as they can work in a safe an effective manner.

  • Educate employees about security

    The first people who need to be aware of the vulnerabilities of their devices are the workers. Therefore, we recommend training them so that they know not to visit certain websites and that they are conscious of the risks involved with installing applications.

  • Maintain updates and avoid localisation

    Updating all of the applications and operating systems on the devices is a basic necessity – old versions of Android are exposed to a whole host of vulnerabilities. Deactivating the GPS is another tip that you should pass on to your employees, as to avoid someone being able to localize them.

  • Keep your information secure

    If an employee accesses relevant documents from their mobile device, it’s advisable to add an additional password or encrypt the device to stop cybercriminals from gaining access to the information.

  • Control access to highly confidential information

    Give out ID cards (PIVs) and restrict access to confidential information to only those who need it for their daily work.

  • BYOD isn’t suitable for all businesses

    In some networks, such as industrial control systems, it isn’t advisable for employees to use their own devices.

Related Posts

No Comments

Comments Closed