4IT Blog

4IT has been serving the Miami area since 2003, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Keep Bring Your Own Device From Becoming Bring Your Own Disaster

Keep Bring Your Own Device From Becoming Bring Your Own Disaster

Do you let your employees bring their own devices in for use on your company network or Wi-Fi connection? If so, we’re sure that they love the freedom that you provide for them, but we must warn you of the dangers that this can bring to an otherwise careful business. We’ll discuss some of the benefits, as well as the pitfalls, of allowing your employees to use personal devices in the workplace.

First, the benefits. Your team will likely get more done if they are using devices that they are comfortable with. After all, forcing someone to use a company-provided iPhone when they have a Samsung device that they are perfectly comfortable with will do nothing but cause friction and make for a frustrating experience. Plus, this also saves you from investing in company devices for your employees, which can be of significant expense. Furthermore, employees just like the freedom of using their own devices. Since nobody likes being told that they can’t do something--namely, use their phones in the workplace--it makes sense that you avoid the problem altogether by implementing BYOD.

However, it’s still important that you implement BYOD in a way which makes sense from a security standpoint, without hindering the ability of your employees to work properly. We’re here to help you design a BYOD strategy that makes sense for your organization.

Application Blacklisting
Not all applications found on the Google Play Store will have your best interests in mind. You want to ensure that your employees won’t download just any application to their device, primarily because they might accidentally expose any of business’ sensitive data on their device. While you could trust that your employees won’t be downloading suspicious apps, you might be surprised to hear that these apps can be rather sneaky with how they access certain data on your device. For an example, look at the typical flashlight app. While it might need access to your camera for use of the flash, it certainly doesn’t need access to any other information, like your contacts or messages. The apps will request permissions, so you’ll have an opportunity to deny them, but it’s best to prevent this outright with application blacklisting. In general, it’s best not to download apps to your device unless they have been approved by IT.

Remote Wiping
What happens if one of your employees loses their device? You never know who could find it. It could be a do-gooder who wants to return it to its proper owner, but more likely than not, it will be someone who either wants to keep the phone for themselves, or sell it to make a quick buck. From there, your imagination can run wild, dreaming up all of the worst-case scenarios. A hacker could steal information about your business from it, or someone could steal the identity of your employee, putting the rest of your organization at risk. Remote wiping dodges this bullet by eliminating data on the device when it is lost or stolen.

User Access Restriction
Not all users need access to the same information in order to do their jobs properly. For example, your human resources department might need access to sensitive information, like dates of birth or Social Security numbers, but the typical user certainly doesn’t. On the other hand, only accounting needs access to bank account routing numbers and other financial credentials. You need to make sure that your BYOD policy implements such solutions to ensure that sensitive information isn’t available to just any employee. This means that anyone who loses their device will only give the device’s finder access to any information they were privy to in the first place. While it might only be a small consolation to consider, it’s certainly better than exposing your entire data infrastructure to a hacker or identity thief.

Does your business need assistance with a BYOD policy? If so, reach out to us at 305-278-7100. Our trusted technicians will work with your organization to ensure you implement only the best, most fitting BYOD policy to suit your needs.

 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Thursday, 23 November 2017
If you'd like to register, please fill in the username, password and name fields.

Mobile? Grab this Article!

Qr Code

Tag Cloud

security Tip of the Week Technology Cloud Privacy Best Practices Microsoft software Internet Business Computing Backup Hackers Productivity Hosted Solutions Business Management Managed Service Provider Google Malware IT Services Business Efficiency Windows Disaster Recovery IT Support Innovation Business Continuity Hardware Workplace Tips VoIP User Tips Saving Money Computer Virtualization Upgrade Windows 10 Miscellaneous Mobile Device Management Mobile Devices Data Server Network Security Mobile Computing Alert Email Communication Network Save Money Microsoft Office Quick Tips Small Business communications Smartphone BYOD Going Green Mobile Office Information Technology Social Media Smartphones Apps Health Android Office Managed IT Services Outsourced IT Browser Operating System Application Gadgets Chrome Ransomware Productivity Disaster Managed IT Tablet WiFi Holiday Mobility Firewall Avoiding Downtime Spam BDR Best Practice Data Management Risk Management Search Cybersecurity Cybercrime Telephone Systems The Internet of Things Remote Computing Unified Threat Management IT Solutions Passwords Vendor Management Saving Time Hacking Remote Monitoring History VPN Employer-Employee Relationship Budget Facebook Apple Automation Hard Drives Marketing Office Tips Proactive IT User Error Phishing Password Law Enforcement Collaboration iPhone Customer Relationship Management Hosted Solution Computers Wireless Technology Data Recovery Recovery Phone System Big Data Money Content Filtering Data Backup Analytics Encryption Gmail Router Government Antivirus Shortcut Humor Administration Social Lithium-ion battery Work/Life Balance Wearable Technology Maintenance PowerPoint Office 365 Telephony Virus Current Events Vulnerability Printer USB Bring Your Own Device Cloud Computing SaaS Google Drive Audit Data Security HaaS Save Time Point of Sale IT COnsultant App Business Intelligence Cost Management Data Protection Computer Repair Intranet Bandwidth Printer Server Social Engineering Laptop OneNote Education Users Trending Private Cloud Politics Net Neutrality Personal Information Windows 8 Tech Support Wireless Unsupported Software Outlook Excel Network Congestion Workplace Internet Exlporer Streaming Media Help Desk Internet of Things Uninterrupted Power Supply Identity Theft Travel online currency Solid State Drive Flexibility Sports Update Customer Service Biometrics Retail Virtual Reality Meetings Samsung IT Support Wi-Fi Efficency Social Networking Emergency Windows 10 Artificial Intelligence Applications Instant Messaging Emails HIPAA hacker Entertainment Benefits DDoS Computer Accessories Transportation Display Computer Care Data Storage Battery Mouse Robot Compliance Augmented Reality Paperless Office Automobile Two-factor Authentication End of Support Managing Stress Fax Server Cast Document Management Value Data Breach Windows 10s Advertising Cameras Legal User systems Nanotechnology Mobile Device Science Touchpad Tablets Managed Security Hard Disk Drive Virtual Desktop Presentation Bluetooth Best Available hack Scam Root Cause Analysis Twitter HBO IT Technicians Nokia NFL best practices SharePoint Cortana Surge Protector Employer Employee Relationship CrashOverride Television IT Management Worker Commute Operating Sysytem 3D Printing Word data breach PDF Teamwork Scalability Files Legislation Settings WIndows Server 2008 Busines Continuity Near Field Communication Windows Ink Safety risk management Networking Text Messaging How To ISP Chromecast Upgrades Patch Management IT consulting Google Maps Human Resources Training Commerce Running Cable Programming Administrator Hard Drive Blogging Consultant Regulation Colocation Reliable Computing Software as a Service The Blindside Of Company Culture Black Market Uograde Access Images Website Touchscreen Sync Bloatware Data Loss IT Security iOS Cleaning Managed IT Service OneDrive Adobe Experience Managed IT Services Amazon Avoid Downtime Co-managed IT Google Docs Keyboard Computer Fan Branding Distributed Denial of Service Licensing Music WIndows 7 Wiring Microsoft Excel Lifestyle Hiring/Firing Dark Web Screen Mirroring eWaste Storage Information Data storage Inbound Marketing Ebay Computing Books Regulations Video Games Debate File Sharing Smart Technology Professional Services Domains Tutorial Taxes Supercomputer Electronic Medical Records Buisness IT Budget Comparison Gift Giving Reputation Specifications Microblogging Youtube Sales Shadow IT Managed Service Provder Relocation Webinar Webinar Mobile IT solutions IT service