BYOD: Bring Your Own Device: Risky?

The BYOD (bring your own device) method to IT, where employees bring their own devices, such as smartphones, tablets, or laptops for work purposes can pose some serious threats to your business, whether it’s a security threat, or the threat of losing productivity and work. Below are some examples of how allowing employees to use their own devices at work may be problematic and how you might be able to prevent it.

Problems
One of your employees uses their smartphones to access company email, sending or receiving content sensitive material or confidential information. Not a big deal, not until their phone happens to get lost or stolen. The information on the phone is now available to anyone who finds it.

Your employee uses their own laptop for work purposes, creating numerous company documents. The employee ends up leaving the company for some reason. All the work completed in the past few years left with them and now the company doesn’t have access to those files.

If an employee’s personal device is infected with malware/spyware and is plugged into the network, it can infect other machines on the network.

Solutions
Require users to have up-to-date virus protection installed on their devices and run a recent clean scan with a report to show before plugging in the device into the network.

Only allow non-authhorized devices on a designated “guest” wireless network.

There are pros and cons to BYOD that need to be thoroughly evaluated in order to understand the security impact for each organization. Having a solid, comprehensive BYOD policy can prevent your business from risky situations.

Born and raised on a horse farm in Marion, IA, Kenyon got her B.A. in English Literature from St. Olaf College in Northfield, MN. She returned to the area after graduating in 2011, and interned at several different marketing agencies prior to coming on as Marketing Coordinator for Tektivity. In her free time, Kenyon enjoys riding horses, studying ballet, and being with family.

Tagged with:
Posted in Uncategorized

Leave a Reply

Your email address will not be published. Required fields are marked *

*


− 4 = five

You may use these HTML tags and attributes: <a href="" title=""> <abbr title=""> <acronym title=""> <b> <blockquote cite=""> <cite> <code> <del datetime=""> <em> <i> <q cite=""> <strike> <strong>