Linkedin Twitter Facebook Customer Service | 01634 291124
About Us Our Accreditations Careers Our Team CSR Our Customers
Systems Technology
  • Home
  • Managed Print Services
    • Managed Print Services

      Are you ready to take control of your printer output and costs?

      • Managed Print Services
      • What is a Managed Print Service?
      • The 5 Stages of our MPS Process
        • Discovery Stage
        • Design & Presentation Stage
        • Transition & Implementation Stage
        • Support & Manage Stage
        • Review Stage
      • Products
        • Multifunctional Devices
        • Production Printing
        • Mobile Print Enabled Devices
        • Single Function Printers
      • Services
        • Preventative Maintenance
        • Unscheduled Calls
        • Remote Print Monitoring
        • Service Contracts
        • uniFLOW Support
  • Managed Print Solutions
    • Managed Print Solutions

      Whatever your technology problem, we have a solution that can match your budget.

      • Controlling Paper Waste
      • Mobile Printing & BYOD
      • PDF Editing & Creation
      • Print Management & Cost Saving
      • Trial Bundle Preparation (Legal)
      • Ways to make your office greener
  • Technology Services
    • Technology Services

      Innovation sits at the heart of everything we do: to provide our clients with a complete business so...

      • What are Technology Services
      • Automated Invoice Processing
      • Document Scanning & Capture
      • Document Management & Storage
      • Document Workflow
  • Industries
    • Industries

      • Education Solutions
      • Charity Solutions
      • Estate Agent Solutions
      • Financial Services Solutions
      • Hotel & Leisure Solutions
      • Legal Solutions
  • Blog
  • Past Events
  • Contact Us
  • About Us
  • Our Accreditations
  • Careers
  • Our Team
  • Our Customers
  • Downloads
Home  /  BYOD  /  Top Tips for Implementing a secure BYOD policy
Top Tips for Implementing a secure BYOD policy
30 January 2017

Top Tips for Implementing a secure BYOD policy

BYOD Leave a Comment

With the increased reliance and necessity of having mobile computing, it’s no wonder that a BYOD (Bring your Own Device) policy has become quite popular with many companies. The cost and inherent difficulty for IT departments to keep up with every technological shift has made employees yearn for their own devices.

From laptops to tablets to smart phones, it can be hugely beneficial for employees to be able to work on the device of their choosing. The familiarity, advanced technology, and accessibility of modern mobile devices are empowering employees to do their best work.

However not every aspect of a BYOD policy is a no brainer. Arguably the biggest drawback is the security risks that come along with employees using their own devices.

“The advent of BYOD has delivered multiple benefits to organizations, such as costs savings, work flexibly and increased employee productivity,” says Daniel Driver, Head of Perception Cyber Security, Chemring Technology Solutions. “However, organizations face a dichotomy – while mobile technology brings operational benefits, it also introduces the compromise of network security.”

Recent hacks, such as the one suffered by health care insurer Anthem in which 80 million personal records were stolen, are having some employers question the longevity of a BYOD policy. And more importantly, if a hack is just an inevitability with a BYOD initiative in place.

Thankfully, there are tangible ways in which companies can combat the threat of security breaches while implementing a successful BYOD policy.

Passwords and Pins

Though it may scream as the most basic of common sense, a successfully BYOD policy relies on appropriate passwords or pins for all mobile devices.

It is recommended that a different password be set for each and every device and account that will be in use. If they aren’t a hacker that accesses one device may then gain access to them all.

Passwords should be unique and feature many different characters for each device, also keeping in mind that passwords should be changed at least every 90 days.

Manage Connectivity Concerns

One of the main issues seen in companies with BYOD policies is the security risks that ensue when users connect their devices to unsecure networks. Devices often connect to a WIFI network without the user knowing, which creates a vulnerability issue.

“Once a mobile device has left a network, the organization has reduced control over what it does, it is therefore vital to assume that the security of every device has been breached – and manage network security accordingly.” Says Driver.

This is solved by having all employees turn off the WIFI and Bluetooth connectivity when not in use, as well as setting devices to require permission to join networks – instead of automatically joining.

No Downloads

Since employees are used to being able to use their devices as they see fit, they can put the company at risk when behaving as they would in the comfort of their own home. One way this mindset has caused issues for companies is through downloading and using apps.

The key here is to implement a strict list of approved applications that can be downloaded on to their devices for use in the office. This will greatly decrease the chance of viruses and possible data theft.

Remote Control

Companies have to take the proper precautions in regards to sensitive information on employee’s mobile devices. That means considering how you can remotely wipe sensitive data off an employee’s device.

“If you intend to retain any control of company data (which is, of course, crucial), you will need to select and implement a mobile device management (MDM) solution. This will give you control over employees’ mobile devices and (importantly) the means to remote wipe them if they are lost or stolen,” says Ben Taylor, the Security Specialist at BestVPN.com.

“This is where the compromise part comes in, because it is at this point when some employees may start to see a negative to being allowed to use their own devices, most likely at the point where it becomes clear that the IT team need to install something on their device to keep company data safe.”

Communication and education with your employees is key when it comes to this step and can actually help drive home the more basic security tips.

As BYOD policies have the capacity to become the rule and no longer the exception, it’s never been more important to define a clear and logical plan for employers and employees alike.

 

Share:
Rising Stars Youth Football Club, Under 13's
 Previous Article Sponsorship: Rising Stars Youth Football Club, Whitstable
New Systems Technology Explainer Videos
Next Article   Our ‘little blue men’ are here to help

Leave a Reply

Cancel reply

Categories

  • Business
  • BYOD
  • Canon
  • Careers
  • Case Studies
  • Digital Transformation
  • Document Management Software
  • Education
  • Events
  • GDPR
  • Intranet
  • Legal
  • Managed Print Services
  • Mobile Printing & BYOD
  • News & Community
  • Print Management Software
  • Security
  • SharePoint
  • Uncategorized

Archives

  • December 2018
  • November 2018
  • August 2018
  • May 2018
  • March 2018
  • January 2018
  • November 2017
  • October 2017
  • September 2017
  • August 2017
  • June 2017
  • May 2017
  • April 2017
  • March 2017
  • February 2017
  • January 2017
  • December 2016
  • October 2016
  • September 2016
  • August 2016
  • May 2016
  • March 2016
  • February 2016
  • November 2015
  • October 2015
  • June 2015
  • January 2015
  • December 2014
  • November 2014
  • October 2014
  • September 2014
Online Chat

Give Us a Call

Call 01634 291124 to speak to someone about your requirements.

Knowledge Area

Browse our latest brochures to download for free

Systems Technology

  • About Us
  • Our Team
  • Our Accreditations
  • Careers
  • Blog
  • Downloads

Contact Us

  • Head Office
  • London Office
  • Tel: 01634 291124

Managed Print Solutions

  • Controlling Paper Waste
  • Mobile Printing & BYOD
  • PDF Editing & Creation
  • Print Management & Cost Saving
  • Trial Bundle Preparation (Legal)
  • Ways to make your office greener

Managed Print Services

  • What is a Managed Print Service?
  • The 5 Stages of our MPS Process
  • Products
  • Services
  • We can help you

Products

  • Multifunctional Devices
  • Production Printing
  • Mobile Print Enabled Devices
  • Single Function Printers

Services

  • Preventative Maintenance
  • Unscheduled Calls
  • Remote Print Monitoring
  • Service Contracts
  • uniFLOW Support

Industries

  • Education Solutions
  • Charity Solutions
  • Estate Agent Solutions
  • Financial Services Solutions
  • Hotel & Leisure Solutions
  • Legal Solutions

Subscribe To Our Newsletter

Linkedin Twitter Facebook

© 2019 Systems Technology (S.E.) Ltd Company number: 02330639. All Rights Reserved all 3rd party trademarks acknowledged. ISO 9001, 14001 Certified Company.

Terms and Conditions Cookie and Privacy Policy Support
back to top