4IT Blog

4IT has been serving the Miami area since 2003, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Keep Bring Your Own Device From Becoming Bring Your Own Disaster

Keep Bring Your Own Device From Becoming Bring Your Own Disaster

Do you let your employees bring their own devices in for use on your company network or Wi-Fi connection? If so, we’re sure that they love the freedom that you provide for them, but we must warn you of the dangers that this can bring to an otherwise careful business. We’ll discuss some of the benefits, as well as the pitfalls, of allowing your employees to use personal devices in the workplace.

First, the benefits. Your team will likely get more done if they are using devices that they are comfortable with. After all, forcing someone to use a company-provided iPhone when they have a Samsung device that they are perfectly comfortable with will do nothing but cause friction and make for a frustrating experience. Plus, this also saves you from investing in company devices for your employees, which can be of significant expense. Furthermore, employees just like the freedom of using their own devices. Since nobody likes being told that they can’t do something--namely, use their phones in the workplace--it makes sense that you avoid the problem altogether by implementing BYOD.

However, it’s still important that you implement BYOD in a way which makes sense from a security standpoint, without hindering the ability of your employees to work properly. We’re here to help you design a BYOD strategy that makes sense for your organization.

Application Blacklisting
Not all applications found on the Google Play Store will have your best interests in mind. You want to ensure that your employees won’t download just any application to their device, primarily because they might accidentally expose any of business’ sensitive data on their device. While you could trust that your employees won’t be downloading suspicious apps, you might be surprised to hear that these apps can be rather sneaky with how they access certain data on your device. For an example, look at the typical flashlight app. While it might need access to your camera for use of the flash, it certainly doesn’t need access to any other information, like your contacts or messages. The apps will request permissions, so you’ll have an opportunity to deny them, but it’s best to prevent this outright with application blacklisting. In general, it’s best not to download apps to your device unless they have been approved by IT.

Remote Wiping
What happens if one of your employees loses their device? You never know who could find it. It could be a do-gooder who wants to return it to its proper owner, but more likely than not, it will be someone who either wants to keep the phone for themselves, or sell it to make a quick buck. From there, your imagination can run wild, dreaming up all of the worst-case scenarios. A hacker could steal information about your business from it, or someone could steal the identity of your employee, putting the rest of your organization at risk. Remote wiping dodges this bullet by eliminating data on the device when it is lost or stolen.

User Access Restriction
Not all users need access to the same information in order to do their jobs properly. For example, your human resources department might need access to sensitive information, like dates of birth or Social Security numbers, but the typical user certainly doesn’t. On the other hand, only accounting needs access to bank account routing numbers and other financial credentials. You need to make sure that your BYOD policy implements such solutions to ensure that sensitive information isn’t available to just any employee. This means that anyone who loses their device will only give the device’s finder access to any information they were privy to in the first place. While it might only be a small consolation to consider, it’s certainly better than exposing your entire data infrastructure to a hacker or identity thief.

Does your business need assistance with a BYOD policy? If so, reach out to us at 305-278-7100. Our trusted technicians will work with your organization to ensure you implement only the best, most fitting BYOD policy to suit your needs.



No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Sunday, 18 February 2018
If you'd like to register, please fill in the username, password and name fields.

Mobile? Grab this Article!

Qr Code

Tag Cloud

security Tip of the Week Technology Cloud Privacy Best Practices Microsoft software Internet Business Computing Hackers Backup Productivity Business Management Hosted Solutions Managed Service Provider Google Malware Business IT Services Efficiency Windows IT Support Innovation Disaster Recovery Business Continuity Hardware Workplace Tips VoIP Computer Mobile Devices User Tips Saving Money Miscellaneous Windows 10 Network Security Virtualization Upgrade Mobile Device Management Data Server communications Mobile Computing Email Alert Save Money Microsoft Office Communication Network Social Media Smartphone Quick Tips Small Business Smartphones Information Technology BYOD Going Green Mobile Office Managed IT Services Outsourced IT Android Health Office Apps Application Ransomware Operating System Chrome Browser Gadgets Managed IT Cybersecurity Holiday Mobility Firewall The Internet of Things Disaster Avoiding Downtime Tablet Productivity WiFi Cybercrime Search Telephone Systems Data Backup Passwords Remote Computing Unified Threat Management Risk Management IT Solutions Best Practice Spam Data Management History Data Recovery BDR Apple Employer-Employee Relationship Budget Marketing VPN Vendor Management Automation Facebook Hacking Hard Drives Remote Monitoring Saving Time Hosted Solution User Error Computers Collaboration Law Enforcement Recovery Phone System Wireless Technology Office Tips Big Data Money Content Filtering iPhone Customer Relationship Management Proactive IT Phishing Password Intranet Telephony Lithium-ion battery Work/Life Balance Bring Your Own Device Office 365 Current Events Printer Humor Administration Antivirus USB Wearable Technology Shortcut Encryption Analytics Vulnerability Social Maintenance PowerPoint Gmail Router Virus Government Social Engineering Users Cost Management Data Protection Flexibility Windows 8 Bandwidth Printer Server Private Cloud Laptop OneNote Data Security Trending Education Net Neutrality Politics Point of Sale Personal Information IT COnsultant SaaS Computer Repair Audit Tech Support HaaS Wireless Unsupported Software Business Intelligence Outlook Cloud Computing Google Drive Save Time App online currency Meetings Identity Theft Solid State Drive Redundancy Data Storage Sports Instant Messaging Emails HIPAA Entertainment Samsung Benefits Efficency DDoS Wi-Fi Computer Accessories Emergency Artificial Intelligence Compliance Network Congestion Applications Mouse hacker Help Desk Two-factor Authentication Display Managing Stress Transportation Excel Computer Care Augmented Reality Battery Robot IT Support Paperless Office Automobile Windows 10 End of Support Travel Fax Server Customer Service Workplace Update Data Breach Social Networking Biometrics Internet Exlporer Retail Streaming Media Virtual Reality Data Loss Uninterrupted Power Supply Internet of Things Uograde Twitter Adobe Images Managed IT Services Computer Fan Google Docs Employer Employee Relationship Surge Protector Human Resources IT consulting Television Running Cable Licensing Worker Commute Operating Sysytem Dark Web PDF 3D Printing Microsoft Excel Screen Mirroring Scalability Reliable Computing Files Bloatware Text Messaging File Sharing Safety Cast Wiring How To Chromecast ISP Information Upgrades Windows 10s Nanotechnology systems Blogging Debate Training Branding Administrator Programming Colocation Consultant Distributed Denial of Service Tablets Hard Disk Drive The Blindside Of Root Cause Analysis hack Website Company Culture HBO Black Market WIndows 7 Access Inbound Marketing Touchscreen eWaste NFL Storage best practices Cortana IT Security CrashOverride Regulations Cleaning IT Management OneDrive data breach Value Amazon Project Management Nokia Word Experience Legislation Keyboard Settings Avoid Downtime Cameras Co-managed IT WIndows Server 2008 User Science risk management MSP Windows Ink Music Hiring/Firing Lifestyle Virtual Desktop Presentation Ebay Bluetooth Patch Management Best Available Data storage Computing IT Technicians Google Maps Books Smart Technology Commerce Video Games SharePoint Regulation Document Management Advertising Software as a Service Legal Mobile Device Teamwork Sync Hard Drive Touchpad iOS Busines Continuity Managed Security Scam Networking Managed IT Service Near Field Communication Device Security Taxes Sales Devices Supercomputer Webinar Managed Service Provder Electronic Medical Records Credit Cards Webinar Spyware IT Budget Mobile IT solutions FAQ Gift Giving Fraud Professional Services Reputation Charger Edge Wireless Charging Ciminal WannaCry IT service Shadow IT Relocation Evernote Domains Comparison Workers Blockchain Specifications Updates Identities Conferencing Buisness Microsoft Word Tutorial Gifts Microblogging Youtube