Leveraging the best bring your own device policy
Long gone are the days when employees packed their briefcases with a personal phone, business phone, and company-issued laptop. Now, the BYOD (bring your own device) lifestyle lets employees’ strike a balance between personal and professional needs. By bringing their own devices, they have the flexibility to access business data on the go; however, this often creates nightmares for IT directors and system administrators. Here are some of the issues they must address to safely implement a BYOD policy.
Before BYOD, all company-owned and operated machinery lived in one physical place. The building and each room in it were secured to a certain standard and the machines inside all had to be locked or shut down when not in use. In today’s mobile workforce, devices travel through multiple locations every day, which increases the risk of a stolen device or someone using a flash drive to install a virus or remove confidential files.
This places the protection of the device and its contents squarely on the owner’s shoulders rather than the company’s. If you are a mobile employee, you must protect your devices the same way you would protect personal valuables such as your wallet, passport, or confidential documents. Make sure you use complex passwords, lock your devices, and keep them within reach to maintain the physical security of your device outside of a secure building.
If a BYOD device has a cracked screen or the touchpad no longer works, these repairs or replacements are the responsibility of the individual. Companies will not guarantee, repair, or support a physical device they did not purchase and issue to you. Many companies will provide peripherals to improve your work experience while you are in certain locations, but they are on loan to you only for that day or assignment.
Whether you are working from a corporate office or from another location, you will need access to various files and folders. Email is not a secure way to share files, even with the most sophisticated encryption software. To ensure secure access to the company file system, users must access the file share via a virtual desktop or terminal services style session.
Device Digital Security
This includes anti-virus software and mobile device management (MDM) applications, which contain corporate data such as email, documents, and applications in an encrypted space to ensure separation from personal data. This seriously decreases the possibility of malware contamination between data sets. When you add other layers of security such as anti-virus to both personal and corporate information, you further decrease the possibility of malware contamination.
These three challenges are only the tip of the iceberg; each one can also be broken down into multiple pieces that each have their own problem. One of the most important things to remember is that you should work with your IT Director and system administrators to follow your company’s BYOD policy to the best of your ability. By doing this, you ensure the digital support network they provide stays intact and minimizes the risk to the whole company from one improperly managed device. It also adds another layer of protection to your personal information that you might not have considered doing otherwise.