BYOD (Bring Your Own Device)
The Bring Your Own Device (BYOD) paradigm has rapidly moved from novelty to near inevitability. Although BYOD may be a convenience to your employees, you need to think about its impact on corporate security models.
BYOD encompasses more than personal computers. It means employees using their own PCs, laptops, smartphones, tablets and more for their work. The concept of BYOD broadens to include software and services, as employees use cloud services and other tools on the web.
What BYOD Means for Security
It’s risky to assume that prohibiting personal devices solves the problem, because employees end up using their own devices anyway, unmonitored and undeterred by your security policies.
Whatever you think of BYOD and however you choose to implement it, IT managers should treat it the same way as any introduction of new technology: with a controlled and predictable deployment.
Ask yourself:
1. Who owns the device?
2. Who manages the device?
3. Who secures the device?
Accountability is not something that goes away for a user just because they personally own the device. After all, the data carried on it is company owned.
How to Secure BYODs
The first and best defence in securing BYODs begins with the same requirements you apply to devices that are already on your network. These security measures include:
- Enforcing strong passcodes on all devices
- Antivirus protection and data loss prevention (DLP)
- Data encryption for disk, removable media and cloud storage
- Mobile device management (MDM) to wipe sensitive data when devices are lost or stolen
- Application control
Sophos Mobile allows your organisation to apply security and centralised control of devices, alleviating weaknesses within the organisation.
Manage Device
- Support BYOD
- OTA enrolment and configuration
- One Policy for iOS and Android
Secure Device
- Enforce passcodes & encryption
- Lock and wipe
- Monitor compliance
Protect Data
- Configure email access
- Configure Wi-Fi access
Frequently Asked Questions (FAQs)
What is BYOD?
Employees use personal devices for work while maintaining security.
How is security maintained on personal devices?
Through encryption, antivirus, passcodes, and mobile device management.
Can BYOD devices access company data remotely?
Yes — secure VPN and remote policies ensure safe access.
Are personal devices monitored?
Yes — Minerva monitors compliance and security without invading personal privacy.
Does BYOD support multiple platforms?
Yes — works with iOS, Android, Windows, and other devices.