MERIT Solutions Blog

MERIT Solutions has been serving the Chesapeake area since 1982, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Keep Bring Your Own Device From Becoming Bring Your Own Disaster

Keep Bring Your Own Device From Becoming Bring Your Own Disaster

Do you let your employees bring their own devices in for use on your company network or Wi-Fi connection? If so, we’re sure that they love the freedom that you provide for them, but we must warn you of the dangers that this can bring to an otherwise careful business. We’ll discuss some of the benefits, as well as the pitfalls, of allowing your employees to use personal devices in the workplace.

First, the benefits. Your team will likely get more done if they are using devices that they are comfortable with. After all, forcing someone to use a company-provided iPhone when they have a Samsung device that they are perfectly comfortable with will do nothing but cause friction and make for a frustrating experience. Plus, this also saves you from investing in company devices for your employees, which can be of significant expense. Furthermore, employees just like the freedom of using their own devices. Since nobody likes being told that they can’t do something--namely, use their phones in the workplace--it makes sense that you avoid the problem altogether by implementing BYOD.

However, it’s still important that you implement BYOD in a way which makes sense from a security standpoint, without hindering the ability of your employees to work properly. We’re here to help you design a BYOD strategy that makes sense for your organization.

Application Blacklisting
Not all applications found on the Google Play Store will have your best interests in mind. You want to ensure that your employees won’t download just any application to their device, primarily because they might accidentally expose any of business’ sensitive data on their device. While you could trust that your employees won’t be downloading suspicious apps, you might be surprised to hear that these apps can be rather sneaky with how they access certain data on your device. For an example, look at the typical flashlight app. While it might need access to your camera for use of the flash, it certainly doesn’t need access to any other information, like your contacts or messages. The apps will request permissions, so you’ll have an opportunity to deny them, but it’s best to prevent this outright with application blacklisting. In general, it’s best not to download apps to your device unless they have been approved by IT.

Remote Wiping
What happens if one of your employees loses their device? You never know who could find it. It could be a do-gooder who wants to return it to its proper owner, but more likely than not, it will be someone who either wants to keep the phone for themselves, or sell it to make a quick buck. From there, your imagination can run wild, dreaming up all of the worst-case scenarios. A hacker could steal information about your business from it, or someone could steal the identity of your employee, putting the rest of your organization at risk. Remote wiping dodges this bullet by eliminating data on the device when it is lost or stolen.

User Access Restriction
Not all users need access to the same information in order to do their jobs properly. For example, your human resources department might need access to sensitive information, like dates of birth or Social Security numbers, but the typical user certainly doesn’t. On the other hand, only accounting needs access to bank account routing numbers and other financial credentials. You need to make sure that your BYOD policy implements such solutions to ensure that sensitive information isn’t available to just any employee. This means that anyone who loses their device will only give the device’s finder access to any information they were privy to in the first place. While it might only be a small consolation to consider, it’s certainly better than exposing your entire data infrastructure to a hacker or identity thief.

Does your business need assistance with a BYOD policy? If so, reach out to us at (757) 420-5150. Our trusted technicians will work with your organization to ensure you implement only the best, most fitting BYOD policy to suit your needs.

 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Friday, July 20 2018

Captcha Image

Tag Cloud

Security Tip of the Week Technology Best Practices Privacy Cloud Business Computing Network Security Hackers Malware Software Productivity Internet Hosted Solutions Managed IT Services Backup Business Management Mobile Devices google Computer Outsourced IT Business Microsoft Disaster Recovery Hardware communications VoIP Business Continuity IT Support Windows 10 Innovation IT Services Email User Tips Cybersecurity Efficiency Data Backup Tech Term Windows Cybercrime Server Ransomware Small Business Internet of Things Apps Managed IT Saving Money Mobility Data Recovery Mobile Device Management browser Productivity Law Enforcement Smartphone Operating System Data Office 365 BDR Money Telephone Systems Save Money Android Virtualization Passwords Phishing Smartphones Data Security Cloud Computing Hosted Solution Quick Tips Managed Service Provider Password Information Technology Holiday Recovery Network Chrome Communication Microsoft Office IT Support BYOD Automation VPN Government Alert Health Miscellaneous Vulnerability Computers Update Two-factor Authentication Gadgets Workplace Tips Wireless Best Practice Social Media Data Breach Risk Management Budget Unsupported Software Data Management upgrade Social App Work/Life Balance Collaboration Cost Management Wi-Fi Google Drive Hacking Application Avoiding Downtime Facebook Compliance Personal Information Gmail Spam Office tips Applications Private Cloud Politics History Remote Computing Managed IT Services Proactive IT Cleaning USB Save Time The Internet of Things Social Engineering Users Employer-Employee Relationship Streaming Media Identity Theft Artificial Intelligence Flexibility Tech Support Shortcut search Data Protection Router Wireless Technology Firewall Blockchain Antivirus User Error Current Events Telephony Audit HaaS Patch Management Devices Mobile Computing Windows 10 Transportation Google Assistant Robot Automobile Wireless Charging Excel Fraud Value End of Support Data Storage IT solutions Saving Time OneNote DDoS Office Phone System Networking Computer Care Humor Disaster Television Legal Project Management Encryption Data Loss Marketing Apple MSP Google Docs Sports WiFi Big Data Going Green Bandwidth Hacker Internet Exlporer eWaste Education Solid State Drive Redundancy Management Vendor Management SaaS Travel Commerce Samsung Content Filtering iPhone Cortana Mobile Security Battery Entertainment FAQ Printing Training Augmented Reality Upgrades Electronic Medical Records server installation dvd "cannot install required files" Hybrid Cloud NFL IoT Text Messaging Lifestyle Identity Business Intelligence Touchscreen stock Point of Sale HIPAA Charger Outlook Spyware Company Culture Consultant Safety Black Market Business Technology Word Language Legislation Data Privacy Managed IT Service Smart Technology tweet Avoid Downtime Computer Forensics iOS calculator Shadow IT Wasting Money Windows Ink Comparison Hard Drive Laptop Uninterrupted Power Supply Twitter Document Management Experience control Evernote PowerPoint Regulation Edge Computer Fan Amazon Google Maps Virus Specifications Chromebook Touchpad Screen Mirroring WSJ Exchange Video Games Wireless Internet Reputation Sync Ciminal Dark Web Meetings Distributed Denial of Service altivista Virtual Reality Virtual Assistant Advertising Software as a Service Proactive Sales Smart Tech Cast Emails Scam Music SBS Workers Gamification Adobe Data storage Settings compaq Alexa for Business Websites Retail Connectivity Employer Employee Relationship Wearable Technology Analytics Updates Memory Administration Licensing Chromecast WannaCry Keyboard hp Instant Messaging Data Theft Conferencing Content Filter HBO Webinar Computer Accessories Worker Commute domain Microsoft Word Students Colocation Mobile intranet Mobile Device Remote Monitoring Managing Stress Hard Drives Microsoft Excel Computing Gifts Monitoring Files IT solutions Lithium-ion battery Books remote Scalability Unified Communications Professional Services IT budget Administrator File Sharing Analysis Hiring/Firing Yahoo IT Management Maintenance Windows 10s Nanotechnology Running Cable Server 2008 How To Financial Relocation Access Storage App store Benefits Ali Rowghani Credit Cards Financial Technology WIndows Server 2008 Device Security Trending Hard Disk Drive Root Cause Analysis Unified Threat Management Bring Your Own Device Tablets Identities PDF Thank You Congratulations CrashOverride Emergency Worker Cache Monitors

Mobile? Grab this Article!

QR-Code dieser Seite

Recent Comments

Anna Jackson 5 SEO Tools To Get a Google-Eye View of Your Website
15 September 2017
Hello Randall! I was doing very important work but due to your subject I felt better to stay at you...
David Miller Not all project-management tools are right for all businesses
25 August 2017
All the points depicted by you in this blog is v.apt. I love the title of this blog because it says ...