Indianapolis computer service indiana it service and network support         L5 Solutions - Blog      // We make IT easy

    indianapolis computer service



How to Get Your Company Secure for the BYOD Mobile Trend

Aug 3rd, 2016 | Posted by | Filed under Indianapolis IT support

The Growing Trend

Mobile devices have changed the face of the workforce. According to Tech Pro Research – 74% percent of businesses survey allow or plan to soon allow employees to “Bring Your Own Device” (BYOD) to work.  In industries like construction where employees are often out of the office setting – this can allow for increased productivity and workflow.

iphone-410311_1280
Extreme Risk

But while companies embrace this technology, they have forgotten a key step – security preparedness. Mobile Security and Risk Review reports that “less 5% of enterprises are using mobile threat detection.” Additionally, 63% of companies have no policy in place regarding the kind of data employees can have on their mobile device.

These numbers should be scary because these risk have had consequences. In 2015, 6 million devices faced a malware infection. That’s 32 for every 1,000 devices. And users aren’t always aware their phone is infected (only 26% are)– leading to thousands of devices that never get cleaned.

How You Can Prepare

With so many different devices out there, it can seem overwhelming to protect them. But there are sure-fire ways to protect your data that can be done across almost any device.

  • Create a Policy: Before the question of security even comes into play, it is important for a company to have a policy for BYOD and mobile use outside of the work place. What kind of activities can an employee do? Just check email, or be able to access customer databases as well? Where can employees use their devices? Setting this up ahead of time can avoid headaches later.
  • Two-Factor Authentication: Additional to a password there are other forms of access mobile devices offer, such as a fingerprint scanner. This makes it that much harder for someone to hack your device.
  • Remote wipe capabilities: If a device is lost or stolen, remote wiping can be useful. While any data unique to that phone could be lost, it is much safer than letting that valuable information fall into the wrong hands. Some phones have settings to wipe after a certain number of failed password attempts.
  • Encryption: Sensitive files and data should be encrypted before viewed on a mobile device, especially over an unprotected wireless network. Apple has had an encryption file system in place for quite a few years on the iPhone. When the iPhone is locked, files are encrypted until the passcode is reentered. Android does not have the same protections automatically, but they can be enabled.
  • Provide training: A good employee is not going to be negligent and allow a data leak on purpose. More than likely, they simply didn’t know the correct way to access sensitive data. Providing routine security training and educating employees on the current threats can help them me more aware.

business-meeting-1238188_1280
In Conclusion

Mobile devices are a sign of innovation and are unlikely to leave the workplace anytime soon. This is a good thing for productivity and moving business forward, but comes with new security risks. Coming up with a policy and putting security measures in places will assure your business is ready to embrace a BYOD policy.

FacebookTwitterLinkedInShare
Comments are closed.