BYOD (Bring Your Own Device)

The Bring Your Own Device (BYOD) paradigm has rapidly moved from novelty to near inevitability. Although BYOD may be a convenience to your employees, you need to think about its impact on corporate security models.

BYOD encompasses more than personal computers. It means employees using their own PCs, laptops, smartphones, tablets and more for their work. The concept of BYOD broadens to include software and services, as employees use cloud services and other tools on the web.


What BYOD Means for Security

It’s risky to assume that prohibiting personal devices solves the problem, because employees end up using their own devices anyway, unmonitored and undeterred by your security policies.

Whatever you think of BYOD and however you choose to implement it, IT managers should treat it the same way as any introduction of new technology: with a controlled and predictable deployment.

Ask yourself:

1. Who owns the device?

That’s a question that has changed over time. In the past, the company owned the devices. With BYOD the devices are owned by the user.

2. Who manages the device?

Previously this was an easy question to answer. Today it could be either the company or the end user.

3. Who secures the device?

Accountability is not something that goes away for a user just because they personally own the device. After all, the data carried on it is company owned.

How to Secure BYODs

The first and best defence in securing BYODs begins with the same requirements you apply to devices that are already on your network. These security measures include:

  • Enforcing strong passcodes on all devices
  • Antivirus protection and data loss prevention (DLP)
  • Data encryption for disk, removable media and cloud storage
  • Mobile device management (MDM) to wipe sensitive data when devices are lost or stolen
  • Application control

Sophos Mobile allows your organisation to apply security and centralised control of devices, alleviating weaknesses within the organisation.

Manage Device

  • Support BYOD
  • OTA enrolment and configuration
  • One Policy for iOS and Android

Secure Device

  • Enforce passcodes & encryption
  • Lock and wipe
  • Monitor compliance

Protect Data

  • Configure email access
  • Configure Wi-Fi access

If you have any concerns over BYOD security or want to check that your organisation is handling it in the correct manner, feel free to call one of the Minerva team, and we will review your options with you.

Have A Problem? Talk To Us

From IT emergencies to niggling issues to fully customised software solutions, the Minerva team is ready to help your IT run smoothly, leaving you more time to run your business.