4IT Blog

4IT has been serving the Miami area since 2003, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Keep Bring Your Own Device From Becoming Bring Your Own Disaster

Keep Bring Your Own Device From Becoming Bring Your Own Disaster

Do you let your employees bring their own devices in for use on your company network or Wi-Fi connection? If so, we’re sure that they love the freedom that you provide for them, but we must warn you of the dangers that this can bring to an otherwise careful business. We’ll discuss some of the benefits, as well as the pitfalls, of allowing your employees to use personal devices in the workplace.

First, the benefits. Your team will likely get more done if they are using devices that they are comfortable with. After all, forcing someone to use a company-provided iPhone when they have a Samsung device that they are perfectly comfortable with will do nothing but cause friction and make for a frustrating experience. Plus, this also saves you from investing in company devices for your employees, which can be of significant expense. Furthermore, employees just like the freedom of using their own devices. Since nobody likes being told that they can’t do something--namely, use their phones in the workplace--it makes sense that you avoid the problem altogether by implementing BYOD.

However, it’s still important that you implement BYOD in a way which makes sense from a security standpoint, without hindering the ability of your employees to work properly. We’re here to help you design a BYOD strategy that makes sense for your organization.

Application Blacklisting
Not all applications found on the Google Play Store will have your best interests in mind. You want to ensure that your employees won’t download just any application to their device, primarily because they might accidentally expose any of business’ sensitive data on their device. While you could trust that your employees won’t be downloading suspicious apps, you might be surprised to hear that these apps can be rather sneaky with how they access certain data on your device. For an example, look at the typical flashlight app. While it might need access to your camera for use of the flash, it certainly doesn’t need access to any other information, like your contacts or messages. The apps will request permissions, so you’ll have an opportunity to deny them, but it’s best to prevent this outright with application blacklisting. In general, it’s best not to download apps to your device unless they have been approved by IT.

Remote Wiping
What happens if one of your employees loses their device? You never know who could find it. It could be a do-gooder who wants to return it to its proper owner, but more likely than not, it will be someone who either wants to keep the phone for themselves, or sell it to make a quick buck. From there, your imagination can run wild, dreaming up all of the worst-case scenarios. A hacker could steal information about your business from it, or someone could steal the identity of your employee, putting the rest of your organization at risk. Remote wiping dodges this bullet by eliminating data on the device when it is lost or stolen.

User Access Restriction
Not all users need access to the same information in order to do their jobs properly. For example, your human resources department might need access to sensitive information, like dates of birth or Social Security numbers, but the typical user certainly doesn’t. On the other hand, only accounting needs access to bank account routing numbers and other financial credentials. You need to make sure that your BYOD policy implements such solutions to ensure that sensitive information isn’t available to just any employee. This means that anyone who loses their device will only give the device’s finder access to any information they were privy to in the first place. While it might only be a small consolation to consider, it’s certainly better than exposing your entire data infrastructure to a hacker or identity thief.

Does your business need assistance with a BYOD policy? If so, reach out to us at 305-278-7100. Our trusted technicians will work with your organization to ensure you implement only the best, most fitting BYOD policy to suit your needs.



No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Thursday, 21 September 2017
If you'd like to register, please fill in the username, password and name fields.

Mobile? Grab this Article!

Qr Code

Tag Cloud

security Tip of the Week Technology Cloud Best Practices Privacy Microsoft Internet Business Computing software Backup Hackers Hosted Solutions Productivity Business Management Managed Service Provider Malware IT Services Google Business Efficiency Windows Innovation Disaster Recovery IT Support Hardware Workplace Tips Business Continuity Saving Money Computer VoIP Upgrade Miscellaneous Virtualization Windows 10 User Tips Mobile Devices Data Mobile Device Management Server Mobile Computing Network Security Email Save Money Communication Microsoft Office Network Alert communications Quick Tips Mobile Office Social Media Smartphones BYOD Information Technology Going Green Apps Small Business Android Health Office Smartphone Outsourced IT Browser Gadgets Application Ransomware Operating System Chrome Managed IT Services Avoiding Downtime Tablet Productivity Disaster Firewall The Internet of Things Managed IT Risk Management Remote Computing Unified Threat Management IT Solutions WiFi Spam Mobility BDR Cybercrime Search Passwords Telephone Systems Holiday Facebook Cybersecurity Hacking Remote Monitoring History Best Practice Hard Drives Data Management Saving Time Employer-Employee Relationship Vendor Management Budget Automation Office Tips Big Data Customer Relationship Management Law Enforcement Proactive IT Phishing Password Apple Hosted Solution Computers Collaboration Marketing Recovery Phone System VPN Wireless Technology Humor Administration Wearable Technology Printer iPhone Maintenance Antivirus USB Content Filtering PowerPoint Shortcut Virus Analytics Office 365 Social Gmail Router User Error Telephony Money Lithium-ion battery Bring Your Own Device Current Events Trending Education Net Neutrality Computer Repair Tech Support HaaS Work/Life Balance Business Intelligence Outlook Encryption Users Data Recovery Government Windows 8 App Social Engineering Cost Management Intranet Bandwidth Wireless Printer Server Unsupported Software Private Cloud Laptop Data Backup Cloud Computing OneNote Google Drive Point of Sale IT COnsultant Save Time Internet of Things Identity Theft Two-factor Authentication Solid State Drive Managing Stress Data Protection Display SaaS Flexibility Excel Augmented Reality Audit Paperless Office IT Support Samsung Social Networking Travel Wi-Fi Fax Server Emergency Workplace Update Customer Service Biometrics Applications Vulnerability Retail Streaming Media Virtual Reality hacker Uninterrupted Power Supply online currency Meetings Personal Information Transportation Data Storage Computer Care Battery Instant Messaging Robot Emails HIPAA Automobile Entertainment End of Support Network Congestion Benefits Efficency DDoS Computer Accessories Help Desk Mouse Internet Exlporer Compliance WIndows 7 Tablets Hard Disk Drive Nokia Managed Security Website Root Cause Analysis Scam eWaste Inbound Marketing HBO Regulations NFL OneDrive best practices CrashOverride Employer Employee Relationship Amazon Sports Value IT Management Worker Commute Co-managed IT Operating Sysytem Cameras PDF User Word data breach Settings Scalability Science Files Presentation WIndows Server 2008 Virtual Desktop Ebay Bluetooth Text Messaging Best Available risk management Safety Computing IT Technicians How To Chromecast Patch Management Upgrades Hard Drive SharePoint Artificial Intelligence Windows 10 Commerce Training Administrator Colocation Regulation Consultant Uograde Images The Blindside Of Teamwork Company Culture Black Market Access Busines Continuity Near Field Communication Sync Touchscreen Politics Networking iOS IT Security Twitter Managed IT Service Cleaning Surge Protector IT consulting Adobe Managed IT Services Experience Human Resources Computer Fan Keyboard Running Cable Avoid Downtime Television 3D Printing Wiring Reliable Computing Licensing Information Music Dark Web Hiring/Firing Screen Mirroring Debate Bloatware Data storage ISP Books Smart Technology Video Games Cast Document Management Advertising Programming Windows 10s Data Breach Blogging Branding Nanotechnology Distributed Denial of Service Legal Data Security Mobile Device Touchpad Storage Taxes IT service Supercomputer Domains Electronic Medical Records IT Budget Lifestyle Windows Ink Reputation Microblogging Youtube Buisness Tutorial Sales Managed Service Provder Webinar Shadow IT Relocation Webinar Gift Giving Mobile IT solutions Professional Services