BYOD is a hot topic in today's workplace. Read this overview of potential security issues every business faces with BYOD policies. To learn more visit usainvestigators.com
3. BYOD – A Real Issue for Businesses
BYOD stands for "Bring Your Own Device" to work and
refers to employee use of their own personal mobile
devices to perform company work activities.
The BYOD phenomenon has raised serious questions
about processes and data security that each business
must address.
4. The BYOD Challenge
IT departments are facing the
unprecedented challenge of implementing
security procedures for the personal mobile
devices of their employees.
This is necessary in order to keep their
networks safe from intrusion, and to protect
company data from being stolen or lost.
5. Smart Facts About BYOD
Nearly 80% of white-collar workers in the US use their own
tablet or Smartphone for work.
70% of mobile professionals will conduct their work on
personal smart devices by 2018.
By 2016 worldwide shipments of smart phones will reach
480 million, and 65% will be used for BYOD
6. Pros of Flexible BYOD Policies
Cost savings – companies don’t have to purchase
mobile devices for employees
Increased employee satisfaction
Cons
Potential Data Security Issues
Privacy Concerns
7. Why Security a key factor?Effective tools for BYOD Security
Mobile device management (MDM) software is available
for IT departments to use for securing BYODs. This
software disables specific features of devices, like
Bluetooth and Wi-Fi. It also enables companies to wipe
stolen or lost devices.
Good Choices Include:
Exchange ActiveSync (EAS)
Microsoft Windows Intune
8. Why Security a key factor?Issues with Lost or Stolen Devices
Nearly 50% of non-IT employees do not have a passcode
for mobile devices.
The greatest impact on the security of
mobile data is lack of employee
awareness.
This can be overcome
by having an effective mobile
security policy which
includes enforcing strict
passwords on BYODs.
9. Why Security a key factor?Malware Threats From BYOD
Did You Know? A lax BYOD policy may result in
malware from employee’s personal mobile devices
being introduced into your company network.
Precautions
Limit access for mobile devices to
necessary programs only
Monitor BYOD traffic to ensure
that malware does not pass from
BYOD to the corporate servers
Implement device enrollment
programs
10. For more information about BYOD issues,
visit us online at usainvestigators.com or
call us directly at 301-279-6700.