Jlhoffman Support

  • Subscribe to our RSS feed.
  • Twitter
  • StumbleUpon
  • Reddit
  • Facebook
  • Digg

Wednesday, 6 March 2013

Dealing With BYOD In Your Business

Posted on 13:09 by Unknown
Mobile Device Management needs to be every organization's top priority

With BYOD (Bring Your Own Device), businesses face an ever-growing threat to IT security and it’s important for you to address it as soon as possible.  Without proper controls in place, it creates a giant hole in your network security. 

The Pew Research Center conducted a national survey recently that revealed:
·     12% of mobile device users store work passwords on their personal device.
·     19% of mobile users stored work documents on their personal device.
·     58% of mobile phone owners do not back up the data on their devices.
·     Nearly 1 in 3 mobile phone owners (31%) have lost their phone or had it stolen.
 
Businesses can be easy targets

According to a recent study, forty percent of all cyber-attacks are directed at small to medium-sized businesses. A recent industry report also noted that mobile-targeted malicious software has virtually exploded in the last year and is expected to continue to grow exponentially.  Not controlling mobile device access to your computer network dramatically increases your business vulnerability to malicious intrusion. 

IT managers have traditionally managed security for company-issued desktops, laptops and devices but policing employees whose personal gadgets connect to the network presents a dramatic new test entirely.  Making sure that personal devices that connect to the network are properly secured with anti-virus/malware and are securely locked down is a particularly vexing new issue.  Employees may even resist your efforts to controll their personal devices.

“When you get that brand new Droid, load it up with apps and then plug it into your work PC in order to update or sync necessary files, your company’s IT guy has to worry about whether that last app you downloaded might infect the entire network,” personal security expert Robert Siciliano recently wrote for InfoSecIsland.com. 

Your IP environment is changing. Your network protection tactics need to change, too. Your company’s security is too important to jeopardize.

What can you do to protect your network? 
 
Determine which devices and operating systems you're willing to support. – Not all devices will meet the security requirements of your organization and nothing says you have to let every device access your network.   Give employees that want to access the network some parameters to go by when they shop for new devices.

Write clear and concise policies laying out what is and isn't allowed for all employees who want to use their personal device and have them sign off on them.

Enforce encryption of data at rest – any apps that download and store data on the device should protect that data. If a PIN or passcode is cracked, you want to make sure that data is still protected.
 
Determine which types of apps are off-limits.  There are hundreds of thousands of apps available, which will you permit?  Keep in mind that many apps have no business on your network!

Train your employees to make sure they understand how to correctly use their applications, make the most of their mobile capabilities, and watch for suspicious activity.

Consider mobile device management software that can provide secure client applications like email and web browsers, over the air device application distribution, configuration, monitoring, and remote wipe capability.
 
Inventory authorized and unauthorized devices and use identifiers like PINs or MAC addresses to keep track of who is doing what on your network.

Inventory authorized and unauthorized users – Remember, access to your network is a privilege and not a right.

As we described earlier, security for Mobile Devices is not a one time shot.  It’s an on-going process.  If you don’t remember that, eventually you’ll get burned.
 

Email ThisBlogThis!Share to XShare to FacebookShare to Pinterest
Posted in | No comments
Newer Post Older Post Home

0 comments:

Post a Comment

Subscribe to: Post Comments (Atom)

Popular Posts

  • Ransomeware Now #1 MalwareThreat - Learn More Here
    I just read an outstanding white paper from a couple of researchers at Sophos Security outlining how Ransomware is passing up FakeAlert malw...
  • Computer Support Rates - When Cheap Really Isn't
    What's in a labor rate?  Why are some IT companies more expensive than others?  Our company is neither the most expensive in our market ...
  • Server Configuration - Heaven Save Us From Well-Meaning Amateurs!
    How do I tell the client what their old tech did to them?  They've got to spend a bunch of money to correct the mess he made and I'm...
  • When It's Time To Fire A Customer
    What?  Isn't that backwards?  Isn't it the customer that usually does the firing? Usually, as business people, we work so hard to fi...
  • Using Personal Computers In the Workplace
    At ACT, we support a great many organizations that allow employees to use their own computers at work.  Sadly, I've noticed that some of...
  • What to do with Windows XP
    Well, it had a good long run.  Windows XP is now 13 years old.  In less than 10 months Microsoft is pulling the plug on our old friend XP.  ...
  • Wireless Networking Is Due For A Big Jump In Performance
    Just when we were getting comfortable with the 802.11n wireless standard, here comes a newer and better wireless solution - 802.11ac.  It wi...
  • Documentation - The Key To Client Support Success
    Recently, we won the trust of a new client that was unhappy with the service provided by their previous IT company.  After the client notifi...
  • Going to the Cloud is easy, getting out is a lot tougher!
    Everyone is pushing you to take your business to the cloud, right?  It's easy, right?  The sales rep used all the right words in his pit...
  • Support for Windows XP and Office 2003 stops on April 8th.
    All Microsoft support for Windows XP and Office 2003 stops on April 8th. What are the risks to your business if you don't upgrade? Let...

Blog Archive

  • ▼  2013 (39)
    • ►  November (3)
    • ►  October (4)
    • ►  September (2)
    • ►  August (4)
    • ►  July (3)
    • ►  June (9)
    • ►  May (3)
    • ►  April (3)
    • ▼  March (6)
      • The Mystery Of The Disappearing Fish
      • Agent of the Devil?
      • Pros and Cons of Office VOIP
      • Java As A Source Of Malware
      • Dealing With BYOD In Your Business
      • The Business Value of a Virtual CIO
    • ►  January (2)
  • ►  2012 (12)
    • ►  December (2)
    • ►  November (8)
    • ►  October (2)
Powered by Blogger.

About Me

Unknown
View my complete profile