MERIT Solutions Blog

MERIT Solutions has been serving the Chesapeake area since 1982, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Keep Bring Your Own Device From Becoming Bring Your Own Disaster

Keep Bring Your Own Device From Becoming Bring Your Own Disaster

Do you let your employees bring their own devices in for use on your company network or Wi-Fi connection? If so, we’re sure that they love the freedom that you provide for them, but we must warn you of the dangers that this can bring to an otherwise careful business. We’ll discuss some of the benefits, as well as the pitfalls, of allowing your employees to use personal devices in the workplace.

First, the benefits. Your team will likely get more done if they are using devices that they are comfortable with. After all, forcing someone to use a company-provided iPhone when they have a Samsung device that they are perfectly comfortable with will do nothing but cause friction and make for a frustrating experience. Plus, this also saves you from investing in company devices for your employees, which can be of significant expense. Furthermore, employees just like the freedom of using their own devices. Since nobody likes being told that they can’t do something--namely, use their phones in the workplace--it makes sense that you avoid the problem altogether by implementing BYOD.

However, it’s still important that you implement BYOD in a way which makes sense from a security standpoint, without hindering the ability of your employees to work properly. We’re here to help you design a BYOD strategy that makes sense for your organization.

Application Blacklisting
Not all applications found on the Google Play Store will have your best interests in mind. You want to ensure that your employees won’t download just any application to their device, primarily because they might accidentally expose any of business’ sensitive data on their device. While you could trust that your employees won’t be downloading suspicious apps, you might be surprised to hear that these apps can be rather sneaky with how they access certain data on your device. For an example, look at the typical flashlight app. While it might need access to your camera for use of the flash, it certainly doesn’t need access to any other information, like your contacts or messages. The apps will request permissions, so you’ll have an opportunity to deny them, but it’s best to prevent this outright with application blacklisting. In general, it’s best not to download apps to your device unless they have been approved by IT.

Remote Wiping
What happens if one of your employees loses their device? You never know who could find it. It could be a do-gooder who wants to return it to its proper owner, but more likely than not, it will be someone who either wants to keep the phone for themselves, or sell it to make a quick buck. From there, your imagination can run wild, dreaming up all of the worst-case scenarios. A hacker could steal information about your business from it, or someone could steal the identity of your employee, putting the rest of your organization at risk. Remote wiping dodges this bullet by eliminating data on the device when it is lost or stolen.

User Access Restriction
Not all users need access to the same information in order to do their jobs properly. For example, your human resources department might need access to sensitive information, like dates of birth or Social Security numbers, but the typical user certainly doesn’t. On the other hand, only accounting needs access to bank account routing numbers and other financial credentials. You need to make sure that your BYOD policy implements such solutions to ensure that sensitive information isn’t available to just any employee. This means that anyone who loses their device will only give the device’s finder access to any information they were privy to in the first place. While it might only be a small consolation to consider, it’s certainly better than exposing your entire data infrastructure to a hacker or identity thief.

Does your business need assistance with a BYOD policy? If so, reach out to us at (757) 420-5150. Our trusted technicians will work with your organization to ensure you implement only the best, most fitting BYOD policy to suit your needs.

 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Thursday, 20 July 2017
If you'd like to register, please fill in the username, password and name fields.

Tag Cloud

Security Tip of the Week Cloud Technology Privacy Business Computing Best Practices Hackers Malware Backup Internet Hosted Solutions Software Network Security Productivity Computer google Business Microsoft Disaster Recovery Windows 10 Innovation Business Continuity Managed IT Services IT Support VoIP IT Services Business Management Hardware Efficiency Outsourced IT Mobility Mobile Devices Save Money Windows Saving Money communications Productivity Ransomware Telephone Systems Apps User Tips Smartphone Quick Tips Operating System Hosted Solution Mobile Device Management Server Password Small Business Law Enforcement Information Technology Email Recovery Cybercrime Managed IT Android Virtualization Data Passwords BDR Money Wireless Cybersecurity Budget upgrade Social Communication VPN Hacking BYOD Facebook Avoiding Downtime Health browser Miscellaneous Computers Office tips Private Cloud Unsupported Software Gadgets Workplace Tips Cloud Computing Social Media USB Save Time Smartphones Data Management Chrome search App Work/Life Balance Firewall Application Google Drive Automation Government Current Events Telephony Alert Office 365 Managed Service Provider Robot Update Cleaning Automobile Applications History End of Support Remote Computing Users DDoS Holiday Best Practice Internet of Things Television The Internet of Things Social Engineering Risk Management Humor Disaster Streaming Media Identity Theft Employer-Employee Relationship WiFi Samsung Going Green Network Bandwidth Flexibility Audit Hacker Solid State Drive Microsoft Office Internet Exlporer Wireless Technology Wi-Fi Antivirus Battery Mobile Computing Saving Time HaaS Transportation Gmail Office Computer Care Personal Information Root Cause Analysis Phishing Black Market calculator Data Storage Scam IT solutions Politics Twitter Avoid Downtime IT solutions control Augmented Reality Managed IT Services Shadow IT Document Management Artificial Intelligence Screen Mirroring Laptop Uninterrupted Power Supply Employer Employee Relationship Proactive IT Experience WSJ Windows 10s Exchange Spam Data Breach Keyboard Computer Accessories Distributed Denial of Service altivista Cast Touchpad Hard Disk Drive Mobile Device Phone System Video Games Reputation Virtual Reality SBS Advertising OneNote Emails Shortcut compaq Data Security Windows 10 Cost Management Music Apple Legal Encryption Meetings Data storage Hiring/Firing Wearable Technology Vendor Management hp HBO Administration Vulnerability Chromecast SaaS Analytics Instant Messaging domain Settings Benefits Sports Worker Commute Data Protection Colocation iOS Unified Threat Management Big Data Managing Stress remote Hard Drives IT Support Tech Support Files Training eWaste Yahoo Computer Fan Administrator Upgrades Lithium-ion battery Books Scalability Running Cable Education Server 2008 Commerce Compliance Company Culture Ali Rowghani Router Relocation Dark Web Access Consultant Trending How To User Error Data Recovery Smart Technology Value iPhone Data Backup Two-factor Authentication Content Filtering server installation dvd "cannot install required files" PDF Business Intelligence Entertainment stock Marketing Nanotechnology Touchscreen Electronic Medical Records Point of Sale Text Messaging Managed IT Service HIPAA tweet Webinar

Mobile? Grab this Article!

QR-Code dieser Seite

Recent Comments

No comments yet.