4IT Blog

4IT has been serving the Miami area since 2003, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Keep Bring Your Own Device From Becoming Bring Your Own Disaster

Keep Bring Your Own Device From Becoming Bring Your Own Disaster

Do you let your employees bring their own devices in for use on your company network or Wi-Fi connection? If so, we’re sure that they love the freedom that you provide for them, but we must warn you of the dangers that this can bring to an otherwise careful business. We’ll discuss some of the benefits, as well as the pitfalls, of allowing your employees to use personal devices in the workplace.

First, the benefits. Your team will likely get more done if they are using devices that they are comfortable with. After all, forcing someone to use a company-provided iPhone when they have a Samsung device that they are perfectly comfortable with will do nothing but cause friction and make for a frustrating experience. Plus, this also saves you from investing in company devices for your employees, which can be of significant expense. Furthermore, employees just like the freedom of using their own devices. Since nobody likes being told that they can’t do something--namely, use their phones in the workplace--it makes sense that you avoid the problem altogether by implementing BYOD.

However, it’s still important that you implement BYOD in a way which makes sense from a security standpoint, without hindering the ability of your employees to work properly. We’re here to help you design a BYOD strategy that makes sense for your organization.

Application Blacklisting
Not all applications found on the Google Play Store will have your best interests in mind. You want to ensure that your employees won’t download just any application to their device, primarily because they might accidentally expose any of business’ sensitive data on their device. While you could trust that your employees won’t be downloading suspicious apps, you might be surprised to hear that these apps can be rather sneaky with how they access certain data on your device. For an example, look at the typical flashlight app. While it might need access to your camera for use of the flash, it certainly doesn’t need access to any other information, like your contacts or messages. The apps will request permissions, so you’ll have an opportunity to deny them, but it’s best to prevent this outright with application blacklisting. In general, it’s best not to download apps to your device unless they have been approved by IT.

Remote Wiping
What happens if one of your employees loses their device? You never know who could find it. It could be a do-gooder who wants to return it to its proper owner, but more likely than not, it will be someone who either wants to keep the phone for themselves, or sell it to make a quick buck. From there, your imagination can run wild, dreaming up all of the worst-case scenarios. A hacker could steal information about your business from it, or someone could steal the identity of your employee, putting the rest of your organization at risk. Remote wiping dodges this bullet by eliminating data on the device when it is lost or stolen.

User Access Restriction
Not all users need access to the same information in order to do their jobs properly. For example, your human resources department might need access to sensitive information, like dates of birth or Social Security numbers, but the typical user certainly doesn’t. On the other hand, only accounting needs access to bank account routing numbers and other financial credentials. You need to make sure that your BYOD policy implements such solutions to ensure that sensitive information isn’t available to just any employee. This means that anyone who loses their device will only give the device’s finder access to any information they were privy to in the first place. While it might only be a small consolation to consider, it’s certainly better than exposing your entire data infrastructure to a hacker or identity thief.

Does your business need assistance with a BYOD policy? If so, reach out to us at 305-278-7100. Our trusted technicians will work with your organization to ensure you implement only the best, most fitting BYOD policy to suit your needs.

 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Wednesday, 26 July 2017
If you'd like to register, please fill in the username, password and name fields.

Mobile? Grab this Article!

Qr Code

Tag Cloud

security Tip of the Week Technology Cloud Privacy Best Practices Microsoft Internet Business Computing software Hackers Backup Hosted Solutions Productivity Business Management Managed Service Provider Malware Business IT Services Efficiency Google Innovation Windows IT Support Workplace Tips Disaster Recovery Hardware Saving Money Computer Miscellaneous VoIP Windows 10 Business Continuity Upgrade Virtualization Mobile Devices Data Mobile Device Management Server User Tips Mobile Computing Network Network Security Save Money Communication Alert Quick Tips Social Media Smartphones BYOD Information Technology Going Green Mobile Office Email Small Business communications Office Health Smartphone Microsoft Office Apps Gadgets Android Application Ransomware Operating System Managed IT Services Outsourced IT Disaster Firewall Avoiding Downtime Tablet Browser IT Solutions Productivity WiFi BDR Search Passwords Mobility Holiday Chrome The Internet of Things Risk Management Remote Computing Unified Threat Management Data Management History Remote Monitoring Hard Drives Spam Saving Time Managed IT Employer-Employee Relationship Telephone Systems Budget Vendor Management Automation Hacking Facebook Best Practice Customer Relationship Management Password Cybercrime Hosted Solution Apple Cybersecurity Recovery Marketing VPN Wireless Technology Office Tips Big Data Social Maintenance USB PowerPoint Content Filtering Phishing Virus Analytics Gmail Router Proactive IT Computers Telephony User Error Law Enforcement Lithium-ion battery Collaboration Phone System Bring Your Own Device Current Events Humor Money Administration Antivirus Wearable Technology Printer iPhone Cloud Computing Google Drive Save Time Encryption Social Engineering Users Windows 8 Government App Cost Management Work/Life Balance Intranet Private Cloud Bandwidth Printer Server Office 365 Laptop OneNote Point of Sale IT COnsultant Trending Education Net Neutrality Computer Repair HaaS Wireless Tech Support Business Intelligence Paperless Office Update Customer Service Internet Exlporer Biometrics Social Networking Retail Outlook Fax Server IT Support Virtual Reality Workplace Internet of Things Identity Theft Meetings Solid State Drive Streaming Media Data Protection Flexibility Uninterrupted Power Supply online currency Instant Messaging Emails HIPAA Entertainment Samsung Benefits Computer Accessories DDoS Mouse Network Congestion Efficency hacker Help Desk Personal Information Two-factor Authentication Transportation Managing Stress SaaS Audit Computer Care Battery Robot Display Unsupported Software Automobile End of Support Augmented Reality Shortcut Document Management SharePoint data breach Ebay Advertising Settings Data Breach Computing Legal Mobile Device Hard Drive Teamwork Touchpad risk management Busines Continuity Managed Security Scam Networking Near Field Communication Uograde Images Windows 10 Commerce Employer Employee Relationship Human Resources Sports IT consulting Worker Commute Running Cable Operating Sysytem Vulnerability PDF Data Recovery Twitter Scalability Files Reliable Computing Surge Protector iOS Text Messaging Managed IT Service Television Bloatware Safety Wiring 3D Printing How To Chromecast Managed IT Services Information Upgrades Wi-Fi Computer Fan Artificial Intelligence Data Storage Emergency Debate Training Branding Administrator Compliance Consultant ISP Applications Distributed Denial of Service Colocation Dark Web The Blindside Of Screen Mirroring Company Culture Black Market Access WIndows 7 Data Backup Inbound Marketing Touchscreen Programming Politics Blogging eWaste IT Security Cast Regulations Cleaning Windows 10s Nanotechnology Excel Nokia Value Experience Website Keyboard Avoid Downtime Data Security Cameras User Hard Disk Drive Root Cause Analysis Science OneDrive Music Hiring/Firing Amazon HBO Virtual Desktop Presentation Best Available Co-managed IT Bluetooth Data storage best practices IT Technicians CrashOverride Travel Books Smart Technology Video Games IT Management Lifestyle WIndows Server 2008 Buisness Microblogging Youtube Taxes Tutorial Sales Supercomputer Managed Service Provder Electronic Medical Records Webinar IT Budget Reputation Webinar Gift Giving IT solutions Storage Shadow IT IT service Relocation Domains