{"id":3205,"date":"2019-07-15T10:32:06","date_gmt":"2019-07-15T09:32:06","guid":{"rendered":"https:\/\/www.imsm.com\/us\/?p=3205"},"modified":"2021-06-02T09:41:31","modified_gmt":"2021-06-02T08:41:31","slug":"5-byod-risks-you-need-to-know-about","status":"publish","type":"post","link":"https:\/\/www.imsm.com\/us\/news\/5-byod-risks-you-need-to-know-about\/","title":{"rendered":"5 BYOD risks you NEED to know about"},"content":{"rendered":"
In an increasingly mobile work environment, BYOD (Bring Your Own Device) policies are becoming a popular choice for many businesses. However, while allowing your staff to bring their own devices to work can have many benefits, there are BYOD security risks that your business needs to be aware of. These are 5 risks to consider when implementing a BYOD policy and how to mitigate them from occurring.<\/p>\n
Even the most careful and trustworthy staff are subject to losing or getting their device stolen. Stolen laptops and phones can easily be opened by taking them to unofficial shops, this can leave your company\u2019s data at risk of falling into the wrong hands.<\/p>\n
How to prevent: Installing tracking systems in your staff\u2019s devices can lead to a much speedier recovery of the item in cases where they have simply misplaced the device. In cases where the device is stolen, having pre-installed mobile data management solutions that can wipe the contents of the device will prevent any loss of sensitive data.<\/p>\n
Note: if installing a tracking system in your employees devices they must be aware of this.<\/p>\n
However strict you set out your BYOD guidelines, you can\u2019t fully prevent your employees from using their device for personal use. Shopping online on a compromised website or connecting to public Wi-Fi in a common area present risks to the data on that device being compromised.<\/p>\n
How to prevent: Make it a requirement that employees access certain services via a VPN (secured network). This will mitigate the risks of data breaches even if your employees are accessing Wi-Fi in a cafe or concert hall.<\/p>\n
Most people who are carrying a smartphone infected with malware are unaware that there is any problem at all. We are more than happy to tick the \u2018I have read the terms and conditions\u2019 box when we haven\u2019t even so much as clicked the link to open the document. Many apps require certain permissions before we can continue and more often than not, we are happy to oblige. Malicious software can encrypt, steal or delete your data, so it is important that you prevent it from infecting your device.<\/p>\n
How to prevent: Keeping your mobile operating system up to date is one way to avoid malware infecting your device. Be wary of domain names that end in something other than .com .co.uk .org or .edu and these can be a red flag for dubious websites. You should encourage staff to download an anti-malware program that will run a scan and remove any malware that it finds.<\/p>\n
Cloud services are becoming an increasingly popular method of storage for many organizations. However, their reason for popularity is that many users can access a range of documents anywhere, but this also presents a major security threat. BYOD programs can leave way for hackers to penetrate insecure cloud storage systems and access sensitive data.<\/p>\n
How to prevent: Implement authentication controls to put stricter regulations on user access. You can also deploy client-side encryption gateways to mitigate the risk of sensitive information reaching an insecure cloud.<\/p>\n
Not implementing a BYOD approach is a risky game to play. If your business is required to comply with certain regulatory requirements such as PCI, you might be fined if you don\u2019t have an effective BYOD policy in place.<\/p>\n
Solution: Make sure your employees sign a written policy, you can find templates online that you can adapt to your company. You should make sure you have included the following in your policy:<\/p>\n
Don\u2019t let security risks scare you from implementing a BYOD program. If prepared and with plans in place to mitigate for any breach, a BYOD scheme is a great way to help your business grow.<\/p>\n
You can align your BYOD security policies with controls outlined in the ISO 27001. This will ensure your data is as secure as possible and leave you with confidence in your data security system.\u00a0<\/span><\/span><\/p>\n