MERIT Solutions Blog

MERIT Solutions has been serving the Chesapeake area since 1982, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Keep Bring Your Own Device From Becoming Bring Your Own Disaster

Keep Bring Your Own Device From Becoming Bring Your Own Disaster

Do you let your employees bring their own devices in for use on your company network or Wi-Fi connection? If so, we’re sure that they love the freedom that you provide for them, but we must warn you of the dangers that this can bring to an otherwise careful business. We’ll discuss some of the benefits, as well as the pitfalls, of allowing your employees to use personal devices in the workplace.

First, the benefits. Your team will likely get more done if they are using devices that they are comfortable with. After all, forcing someone to use a company-provided iPhone when they have a Samsung device that they are perfectly comfortable with will do nothing but cause friction and make for a frustrating experience. Plus, this also saves you from investing in company devices for your employees, which can be of significant expense. Furthermore, employees just like the freedom of using their own devices. Since nobody likes being told that they can’t do something--namely, use their phones in the workplace--it makes sense that you avoid the problem altogether by implementing BYOD.

However, it’s still important that you implement BYOD in a way which makes sense from a security standpoint, without hindering the ability of your employees to work properly. We’re here to help you design a BYOD strategy that makes sense for your organization.

Application Blacklisting
Not all applications found on the Google Play Store will have your best interests in mind. You want to ensure that your employees won’t download just any application to their device, primarily because they might accidentally expose any of business’ sensitive data on their device. While you could trust that your employees won’t be downloading suspicious apps, you might be surprised to hear that these apps can be rather sneaky with how they access certain data on your device. For an example, look at the typical flashlight app. While it might need access to your camera for use of the flash, it certainly doesn’t need access to any other information, like your contacts or messages. The apps will request permissions, so you’ll have an opportunity to deny them, but it’s best to prevent this outright with application blacklisting. In general, it’s best not to download apps to your device unless they have been approved by IT.

Remote Wiping
What happens if one of your employees loses their device? You never know who could find it. It could be a do-gooder who wants to return it to its proper owner, but more likely than not, it will be someone who either wants to keep the phone for themselves, or sell it to make a quick buck. From there, your imagination can run wild, dreaming up all of the worst-case scenarios. A hacker could steal information about your business from it, or someone could steal the identity of your employee, putting the rest of your organization at risk. Remote wiping dodges this bullet by eliminating data on the device when it is lost or stolen.

User Access Restriction
Not all users need access to the same information in order to do their jobs properly. For example, your human resources department might need access to sensitive information, like dates of birth or Social Security numbers, but the typical user certainly doesn’t. On the other hand, only accounting needs access to bank account routing numbers and other financial credentials. You need to make sure that your BYOD policy implements such solutions to ensure that sensitive information isn’t available to just any employee. This means that anyone who loses their device will only give the device’s finder access to any information they were privy to in the first place. While it might only be a small consolation to consider, it’s certainly better than exposing your entire data infrastructure to a hacker or identity thief.

Does your business need assistance with a BYOD policy? If so, reach out to us at (757) 420-5150. Our trusted technicians will work with your organization to ensure you implement only the best, most fitting BYOD policy to suit your needs. your social media marketing partner


No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Friday, 23 February 2018

Captcha Image

Tag Cloud

Tip of the Week Security Technology Cloud Privacy Best Practices Business Computing Hackers Network Security Software Malware Internet Hosted Solutions Backup Business Management google Managed IT Services Productivity Microsoft Disaster Recovery Computer Outsourced IT Business Continuity Mobile Devices Business IT Support Windows 10 communications VoIP User Tips Productivity IT Services Hardware Innovation Email Cybercrime Mobile Device Management Data Backup Windows Mobility Managed IT Efficiency Smartphone Server Ransomware Cybersecurity Apps Data Recovery Saving Money Save Money browser Telephone Systems Small Business Operating System Law Enforcement Internet of Things Hosted Solution Quick Tips Android Virtualization Chrome BDR Money Information Technology VPN Passwords Recovery Password Data Security Holiday Office 365 Microsoft Office BYOD Data Alert Wireless Health Miscellaneous App Managed Service Provider Communication Computers Risk Management Unsupported Software Phishing Social Media Cloud Computing Best Practice Facebook Government Budget Work/Life Balance Smartphones Data Management Gadgets Hacking Google Drive Avoiding Downtime IT Support Social upgrade search USB Save Time Windows 10 Private Cloud Office tips Applications History Vulnerability Proactive IT Identity Theft User Error Managed IT Services Flexibility The Internet of Things Shortcut Data Breach Wi-Fi Firewall Application Workplace Tips Current Events Audit Wireless Technology Personal Information Social Engineering Collaboration Automation Politics Telephony Two-factor Authentication WiFi Mobile Computing Commerce Transportation Saving Time Cleaning Going Green Cortana Bandwidth Office Project Management Robot Computer Care Phone System eWaste Legal End of Support Remote Computing Users Spam Encryption Excel Data Storage Artificial Intelligence Disaster OneNote Humor Gmail Blockchain Cost Management Employer-Employee Relationship Update SaaS Data Loss Sports IT solutions Network Samsung Antivirus Marketing Content Filtering DDoS Tech Support Google Docs Battery HaaS Hacker Internet Exlporer Solid State Drive Television Compliance Data Protection Streaming Media Apple Automobile iPhone Redundancy Storage Ciminal Document Management Credit Cards WIndows Server 2008 domain Experience Hard Disk Drive Root Cause Analysis Text Messaging Tablets Video Games FAQ Patch Management remote Yahoo Augmented Reality Virtual Reality NFL Lifestyle Scam Business Intelligence MSP Touchscreen Charger Running Cable Outlook Server 2008 Music Ali Rowghani Uninterrupted Power Supply Laptop Word Trending Legislation Employer Employee Relationship Managed IT Service intranet Wireless Charging Analytics iOS Keyboard Instant Messaging Touchpad Windows Ink Reputation Comparison Computer Accessories IT budget Worker Commute Advertising Evernote Mobile Device Regulation server installation dvd "cannot install required files" Big Data Computer Fan Google Maps stock Maintenance Managing Stress Specifications Screen Mirroring Dark Web Scalability Networking Data storage Sync Books Software as a Service tweet Hiring/Firing Meetings Device Security Education Administration Sales Chromecast Vendor Management Cast Identities Emails Router How To Workers Adobe calculator Twitter Benefits Settings Devices Colocation Retail control WannaCry Hard Drives Updates Unified Threat Management Licensing WSJ Files Spyware Conferencing Administrator Training HBO Exchange Lithium-ion battery Entertainment Webinar altivista Electronic Medical Records Microsoft Word Distributed Denial of Service Upgrades Mobile Microsoft Excel Fraud Point of Sale Relocation Gifts Access Company Culture SBS HIPAA IT solutions compaq Black Market Consultant Professional Services File Sharing Smart Technology Edge Avoid Downtime Wearable Technology Value IT Management Windows 10s hp Nanotechnology Shadow IT PDF Travel Worker CrashOverride Thank You Congratulations Cache Monitors Remote Monitoring Safety Emergency

Mobile? Grab this Article!

QR-Code dieser Seite

Recent Comments

Anna Jackson 5 SEO Tools To Get a Google-Eye View of Your Website
15 September 2017
Hello Randall! I was doing very important work but due to your subject I felt better to stay at you...
David Miller Not all project-management tools are right for all businesses
25 August 2017
All the points depicted by you in this blog is v.apt. I love the title of this blog because it says ...