Get Steve's Book on Amazon
  • Eliminating
    Eliminating "Us And Them": Making IT and the Business One
    by Steven Romero
Tuesday
May152012

Tips to Secure Your Enterprise in the New World of BYOD

This is the second st guest post I have hosted on my blog. I met Ashley Furness through Kyle Lagunas, my first guest blog poster. Ashley is the CRM Analyst at Software Advice - an online resource for help desk and CRM software buyers guides and more. Here is her simple but sage advice for enabling employees to bring their own devices to work - a quickly growing trend for tech-savvy users:

Bring Your Own Device (BYOD) policies–or allowing employees to use personal laptops, tablets and smartphones for work-related tasks–benefits employers and users in compelling ways. Workers get to use the device they are most comfortable with, and employers reap increased productivity benefits.

But sensitive corporate data is very likely vulnerable to theft on employee-owned mobile devices.

Fortunately, help desk operators can take steps to fight back against these BYOD-created threats. Here are four strategies your company should implement to keep data secure, while supporting employees' choice to use their own laptops, smartphones and tablets in the workplace.

1. Encrypt All Data

Employees using public, often unencrypted Wi-Fi connections is one of the most significant and prevalent exposure points. In fact one study found 31 percent of corporate employees had used a laptop to connect to their company’s network through a public hotspot.

To curb this security risk, IT groups should distribute and manage Virtual Private Network (VPN) solutions for all mobile devices. These tools encrypt transmitted data regardless of where or how it is accessed through mobile devices.

Establishing guidelines for remote access is also critical. These rules should specify which operating systems--such as iOS and Android--are supported as each comes with unique benefits and challenges.

2. Have a Plan for Lost or Stolen Devices

Experts recommend IT teams have specific lost or stolen device action plans written into BYOD policies. This should include such steps as changing email, Dropbox and other passwords if they were installed on the device. 

The help desk should also install remote wiping and locking solutions on BYOD devices, which can be included in the mobile device management (MDM) solution.

3. Monitor and Control Network Use

Administrators should integrate MDM systems with help desk software. This will help agents watch for network bottlenecks and ensure compliance with BYOD policies.

Granting BYOD users network access on two or three devices is great for productivity, but this can also tax networks. An MDM can track in real time when a device signs in, what users access, and whether it’s configured with the appropriate security software.

Another option is a virtual desktop infrastructure (VDI) solution, which equips IT teams with tools for monitoring network, server and storage performance. It identifies a device causing a slowdown and automatically notifies an agent. 

4. Install Anti-malware/virus Infrastructure and Educate Users

Malware creation hit record highs last year with a reported 26 million new strains in circulation. This malicious software can wreak havoc on your company’s security if an infected smartphone, tablet or laptop is connected to your company’s network or email.

To combat these threats, IT teams should equip devices with anti-virus and anti-malware systems. These functions are sometimes wrapped into VPN or MDM software. Others can be installed separately to fight exposure to viruses, malware and spammers.

All of these strategies add up to a significant shift in help desk operations and spending. The cost can seem daunting, but the decision now isn’t whether to make the investment but rather how much risk you are willing to take by doing nothing.

PrintView Printer Friendly Version

EmailEmail Article to Friend

References (82)

References allow you to track sources for this article, as well as articles that were written in response to this article.
  • Response
    Response: click here
    Romero Consulting - Blog - Tips to Secure Your Enterprise in the New World of BYOD
  • Response
    [...]Romero Consulting - Blog - Tips to Secure Your Enterprise in the New World of BYOD[...]
  • Response
    Response: Rooting Android
    I simply wanted to say thanks all over again. I am not sure the things that I would've tried without the actual tactics shown by you relating to my question. It was actually a very alarming setting in my opinion, however , discovering this specialised way you solved the issue took ...
  • Response
    Romero Consulting - Blog - Tips to Secure Your Enterprise in the New World of BYOD
  • Response
    Response: Gadget Terbaru
    Review, Harga Dan Spesifikasi Gadget Terbaru
  • Response
    Response: Lintas News
    Portal Informasi Teknologi Terkini
  • Response
    Auto Owner Manuals Download
  • Response
  • Response
    Response: https://flattr.com
    Romero Consulting - Blog - Tips to Secure Your Enterprise in the New World of BYOD
  • Response
    Response: social shopping
    I am very happy after find your blog. I looking for this type of article, its very helpful my business marketing. I really thanks to who was wrote this content perfectly.
  • Response
    Informasi seputar kamera digital terbaru dan terlengkap
  • Response
    Romero Consulting - Blog - Tips to Secure Your Enterprise in the New World of BYOD
  • Response
  • Response
    Romero Consulting - Blog - Tips to Secure Your Enterprise in the New World of BYOD
  • Response
    Bring your own device policies or making it possible for personnel to use private notebook computers, supplements as well as touch screen phones regarding work related tasks benefits employers as well as customers in persuasive ways. Individuals be able to operate the device they're beloved using, as well as employers obtain ...
  • Response
  • Response
    Response: chiroractic
    Romero Consulting - Blog - Tips to Secure Your Enterprise in the New World of BYOD
  • Response
    Romero Consulting - Blog - Tips to Secure Your Enterprise in the New World of BYOD
  • Response
    Response: SEO Sydney
    Romero Consulting - Blog - Tips to Secure Your Enterprise in the New World of BYOD
  • Response
    Romero Consulting - Blog - Tips to Secure Your Enterprise in the New World of BYOD
  • Response
    Response: chiroractic
    Romero Consulting - Blog - Tips to Secure Your Enterprise in the New World of BYOD
  • Response
    Romero Consulting - Blog - Tips to Secure Your Enterprise in the New World of BYOD
  • Response
    Romero Consulting - Blog - Tips to Secure Your Enterprise in the New World of BYOD
  • Response
    Response: D D Photographics
    Romero Consulting - Blog - Tips to Secure Your Enterprise in the New World of BYOD
  • Response
    Response: D D Photographics
    Romero Consulting - Blog - Tips to Secure Your Enterprise in the New World of BYOD
  • Response
    Romero Consulting - Blog - Tips to Secure Your Enterprise in the New World of BYOD
  • Response
    Response: storify.com
    Romero Consulting - Blog - Tips to Secure Your Enterprise in the New World of BYOD
  • Response
    Romero Consulting - Blog - Tips to Secure Your Enterprise in the New World of BYOD
  • Response
    Romero Consulting - Blog - Tips to Secure Your Enterprise in the New World of BYOD
  • Response
    Response: television cameras
    Romero Consulting - Blog - Tips to Secure Your Enterprise in the New World of BYOD
  • Response
    Response: Darian Braun
    Romero Consulting - Blog - Tips to Secure Your Enterprise in the New World of BYOD
  • Response
    I really appreciate the idea of your stolen devices recovery plan. All your ideas are very innovative and useful for a secure enterprise
  • Response
    Response: ezines for writers
    Romero Consulting - Blog - Tips to Secure Your Enterprise in the New World of BYOD
  • Response
    Response: World Top news
    Romero Consulting - Blog - Tips to Secure Your Enterprise in the New World of BYOD
  • Response
    Response: centralhacks.com
    Romero Consulting - Blog - Tips to Secure Your Enterprise in the New World of BYOD
  • Response
    Romero Consulting - Blog - Tips to Secure Your Enterprise in the New World of BYOD
  • Response
    Romero Consulting - Blog - Tips to Secure Your Enterprise in the New World of BYOD
  • Response
    Response: Reachout Wireless
    Romero Consulting - Blog - Tips to Secure Your Enterprise in the New World of BYOD
  • Response
    Response: laptop service
    Romero Consulting - Blog - Tips to Secure Your Enterprise in the New World of BYOD
  • Response
    Romero Consulting - Blog - Tips to Secure Your Enterprise in the New World of BYOD
  • Response
    Romero Consulting - Blog - Tips to Secure Your Enterprise in the New World of BYOD
  • Response
    Romero Consulting - Blog - Tips to Secure Your Enterprise in the New World of BYOD
  • Response
    Romero Consulting - Blog - Tips to Secure Your Enterprise in the New World of BYOD
  • Response
    Romero Consulting - Blog - Tips to Secure Your Enterprise in the New World of BYOD
  • Response
    Response: disney cookie jar
    Romero Consulting - Blog - Tips to Secure Your Enterprise in the New World of BYOD
  • Response
    Response: Marketing
    Romero Consulting - Blog - Tips to Secure Your Enterprise in the New World of BYOD
  • Response
    Romero Consulting - Blog - Tips to Secure Your Enterprise in the New World of BYOD
  • Response
    Response: Rejuvius
    Romero Consulting - Blog - Tips to Secure Your Enterprise in the New World of BYOD
  • Response
    Response: Rejuvius
    Romero Consulting - Blog - Tips to Secure Your Enterprise in the New World of BYOD
  • Response
    Response: Rejuvius Review
    Romero Consulting - Blog - Tips to Secure Your Enterprise in the New World of BYOD
  • Response
    Response: T-90 Xplode
    Romero Consulting - Blog - Tips to Secure Your Enterprise in the New World of BYOD
  • Response
    Romero Consulting - Blog - Tips to Secure Your Enterprise in the New World of BYOD
  • Response
    Response: fuck everybody
    Romero Consulting - Blog - Tips to Secure Your Enterprise in the New World of BYOD
  • Response
    Response: Slimfy Review
    Romero Consulting - Blog - Tips to Secure Your Enterprise in the New World of BYOD
  • Response
    Response: Slimfy Review
    Romero Consulting - Blog - Tips to Secure Your Enterprise in the New World of BYOD
  • Response
    Romero Consulting - Blog - Tips to Secure Your Enterprise in the New World of BYOD
  • Response
    Response: click here
  • Response
    Response: forex ea
    Romero Consulting - Blog - Tips to Secure Your Enterprise in the New World of BYOD
  • Response
    Kelly
  • Response
  • Response
  • Response
    Romero Consulting - Blog - Tips to Secure Your Enterprise in the New World of
  • Response
    Romero Consulting - Blog - Tips to Secure Your Enterprise in the New World of
  • Response
    Response: visit here
    Romero Consulting - Blog - Tips to Secure Your Enterprise in the New World of
  • Response
    Response: hotmail sign in
  • Response
  • Response
  • Response
    Response: Assignment Help UK
  • Response
  • Response
  • Response
  • Response
  • Response
    Response: security solution
  • Response
    American Lifeguard Association
  • Response
    Response: sharepoint design
    sharepoint design
  • Response
  • Response
    TigerExch - India's Fastest Growing Exchange
  • Response
    Mass Texting, Text Blast & Bulk SMS
  • Response
    Mass Text Messaging, Text Messaging Services,
  • Response
  • Response
  • Response

Reader Comments (3)

No doubt! These are the awesome tips to secure in this modern world.

May 9, 2013 | Unregistered CommenterSohil Memon

There are some interesting points in time in this article but I don’t know if I see all
of them center to heart. There is some validity but I will take hold opinion until I look into it further.
Good article , thanks and we want more! Added to FeedBurner as well

June 29, 2014 | Unregistered CommenterRumah Minimalis

You've right mate !! you absulutlty right ;)

PostPost a New Comment

Enter your information below to add a new comment.

My response is on my own website »
Author Email (optional):
Author URL (optional):
Post:
 
Some HTML allowed: <a href="" title=""> <abbr title=""> <acronym title=""> <b> <blockquote cite=""> <code> <em> <i> <strike> <strong>
« The Business of IT Governance | Main | The Ever-changing Role of The CIO »