Thursday 2 April 2015

Four key factors to BYOD (Bring Your Own Device) security


BYOD is an IT policy where company employees are permitted to use their own mobile devices to access organisation data and systems. This aspect is changing the way IT is acquired, managed, delivered, and secured. It also helps in understanding why Cloud and Virtualization technologies are prime enabler of BYOD.

In today’s time , with almost every ‘bring your own device(BYOD)’ discussion will have some mention of security as it is still the biggest obstruction keeping employers from completely using their personal devices inside the office. BYOD enables employees to work on their own device to access corporate emails, to view documents and so on and there is no absolute way to completely safeguard each and every device in a BYOD surrounding. Thus, if not properly regulated, BYOD can hover IT security and lead company’s critical data systems at risk.

Company needs to consider the following 4 major factors when building BYOD.

Improve your network


Letting employees to use their personal devices at work will eventually result in invasion of devices on company’s network. The next question that arises is whether company network can handle the increase? It needs to ensure that the network is upgraded to lever the stress of multiple devices working simultaneously. Many companies have replaced 802.11a/b/g infrastructure with 802.11n and deployed APs for maximum bandwidth and coverage.
Company needs to take into account cloud solutions as part of your BYOD plan. Most of us give importance to data virtualisation and backup storage and overlook the purposes of the cloud solutions. Also one of the benefits of BYOD for the company is that it provides flexibility to the employees i.e. it allows people to work from anywhere, and so company’s cloud solutions must gauge to account for work outside of physical locations. 

Personal supervising


Many organisations implement different tools to manage and monitor employee devices, but these devices still belong to the employees. Companies need to ensure that they do not cross their limits and claim employees machines as their own by implementing various security software’s and business application. It is better that company focus at finding solutions that limit tracking and decrease the inaccuracy while at work.

Building trust and assigning responsibility


Trust is the most important factor when it comes to BYOD. Trust is the centre of enterprise security. Employers need to take more responsibility in a BYOD environment. Every company should ask itself who it should trust when it comes to company information. Implementing BYOD policy and giving employees more freedom over company information is surely a good sign of trust. They need to know what’s expected out of them, and what legal consequences they might have to face if any critical or confidential information is leaked. When implementing a BYOD strategy, it’s important to incorporate who is responsible in broad range of circumstances which will motivate employees to be cautious of their actions.

Clear communication


If trust is the base of security, then clear communication helps to keep everything aligned. Modification at any level needs clear communication between management and subordinates. Employees need to know ways to communicate their problems or concerns and get solutions and at the same time, higher management should also understand employees concerns and respond to their questions and avoid misunderstanding. Company needs to ensure that in the process of building a BYOD strategy, there is a clear communication and involvement of all employees. It also needs to ensure that new people joining the organisation understand the policy once implemented in order to avoid any kind of misunderstanding in expectations.

By incorporating industry chief practices, building a BYOD policy and implementing approaches that are flexible, companies will be better prepared to deal with challenges caused by the use of employees’ own devices.

About Author:
Nisha Bhatt is a consultant in Systems Plus Pvt. Ltd. Within Systems Plus, she actively contributes to the areas of Technology and Information Security. She can be contacted at: nisha.bhatt@spluspl.com

1 comment: