The traditional desktop computer is no longer the only device we use to get work done. For the past few years workers have increasingly begun to use their own smartphones and tablets for work. According to a study carried out by Tech Pro Research, 74% of businesses allow, or are planning to allow, their employees to bring their own devices to the office.
Despite the benefits, such as being able to communicate easily with employees when they aren’t at their workstations, security remains a priority and with the BYOD (Bring Your Own Device) culture – it is important to stay on top of it.
The variety of devices used in the workplace and the resulting loss of control held by the business, means that cybercriminals are able to take advantage of the many vulnerabilities in mobile devices to access the company’s network.
Tips on how to secure BYOD within a Company
Assign someone to be in charge of managing the devices
You need to give the responsibility to a member of the IT department to make it easier to control. If your company is small, you can contract an external service.
Give support to all platforms possible
The IT department of the business has to guarantee technical support for all devices used by employees so as they can work in a safe an effective manner.
Educate employees about security
The first people who need to be aware of the vulnerabilities of their devices are the workers. Therefore, we recommend training them so that they know not to visit certain websites and that they are conscious of the risks involved with installing applications.
Maintain updates and avoid localisation
Updating all of the applications and operating systems on the devices is a basic necessity – old versions of Android are exposed to a whole host of vulnerabilities. Deactivating the GPS is another tip that you should pass on to your employees, as to avoid someone being able to localize them.
Keep your information secure
If an employee accesses relevant documents from their mobile device, it’s advisable to add an additional password or encrypt the device to stop cybercriminals from gaining access to the information.
Control access to highly confidential information
Give out ID cards (PIVs) and restrict access to confidential information to only those who need it for their daily work.
BYOD isn’t suitable for all businesses
In some networks, such as industrial control systems, it isn’t advisable for employees to use their own devices.