• Skip to primary navigation
  • Skip to main content
  • Skip to primary sidebar
  • Skip to footer
  • Student360
  • About
    • Secure360
    • UMSA
  • Secure360 2022
  • For Sponsors
  • For Speakers
  • Get Involved
  • Blog
  • Nav Social Menu

    • Facebook
    • LinkedIn
    • Twitter
    • Vimeo

Secure360

Avoid these common BYOD mistakes

October 16, 2013 by Secure360 and UMSA

byodMistakesDespite IT department and executive fear, BYOD is the future. It offers enhanced productivity, cost savings, and it improves employee satisfaction. With or without approval, employees will find a way to use their own devices; companies need to embrace BYOD before it enters the company without an official policy in place.

As you are planning or revising your BYOD policy, make sure to avoid these common BYPD mistakes:

Lack of access control

Mobile apps should be no different than remote login. Any mobile app that gives access to company data should require user authentication, authorization, and access control. If the data is highly confidential, we suggest encryption of all data traffic and adding an extra layer of authentication on the app.

Allowing any device

You can’t allow archaic smartphones or jail-broken iPhones. IT would have an anxiety attack simply trying to get malware and anti-virus software installed on all those phones. This doesn’t mean everyone has to have an iPhone 5. This simply means you need to only allow devices that support the BYOD program.

Not policing policy

Policy compliance will not be achieved without effective and consistent policing. Policing sounds harsh, but what was the point of coming up with a policy if no one is forced to follow it? Make sure you have the capability to detect and stop misuse, follow up on alerts manually or automatically, and have the appropriate personal review reports. Constantly audit your program to make sure it is still functional and effective.

Overlooking apps

Telling employees what apps they can download would be upsetting and annoying for everyone involved, so it is better to have a list of banned apps. Apps are an easy way to deliver malware or viruses, so you need to keep an updated app “blacklist.”

Weak security

You need to define user rights. Most companies will not benefit from allowing everyone to have access to everything. Users should be restricted to the information they need to access. You should also have location applications on the devices in case a device is lost or stolen. If you really want to be safe (and we always suggest that) you should have the capability to wipe company content, apps, and passwords off lost or stolen devices.

It’s time to throw away your fear and loathing of BYOD. It is here and people crave it, so create a BYOD policy before the lack of one hurts your company.

Filed Under: Business Continuity Management, Cybersecurity, Professional Development, Risk and Compliance

About Secure360 and UMSA

The Secure360 and UMSA team is made up of professionals in the security and risk management industries. Topics of expertise range from physical security, IT, risk management, cybersecurity, cloud, information security and records management.

Reader Interactions

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Primary Sidebar

Categories

  • Uncategorized
  • Guest Posts
  • Business Continuity Management
  • News and Events
  • Physical Security
  • Cybersecurity
  • Professional Development
  • Risk and Compliance

latest tweets

  1. Secure360 Conference
    Secure360 Conference: New post alert! Learn more about our awesome 2022 @UMSAOrg #scholarship winners https://t.co/C8VnqX3wWW
    about 20 hours ago

  2. Secure360 Conference
    Secure360 Conference: With so much fun had this year, we're eager for next year! Mark your calendars for May 9-10, 2023 back at Mystic La… https://t.co/Cbk0abnNSO
    about 1 day ago

  3. Secure360 Conference
    Secure360 Conference: With #Sec360 2022 officially in the books, we wanted to share a little recap of the fun! https://t.co/iMPwAp1Kac … https://t.co/kk7xRUXoRo
    about 4 days ago

Footer

Contact

For more information about UMSA events, contact: Marie Strawser

Email List Signup

Join our email list for monthly Secure360 news and updates!




Join our tradeshow email list for updates on sponsorship opportunities and upcoming exhibitor deadlines.

Sponsored by:
© 2022 Secure360. All rights reserved.