Many enterprises appreciate the benefits that come from a bring your own device (BYOD) program. It saves the organization from purchasing, maintaining, or updating smartphones and tablets, and it provides employees with the ability to use a device they already prefer and are trained to use.
It’s no surprise that a BYOD program makes those charged with securing the network a bit uneasy, but there are steps that can be put in place that protect both the enterprise and the users of the BYOD program:
Set up a clear BYOD policy. Determine the users you’ll allow, and which devices you’ll permit on the program. Set clear rules and communicate them to all users of BYOD devices. Utilize network access control (NAC) to determine which parts of the network each user is authorized to use.
It’s also important to use training to educate users about the password policy as well as the risks of BYOD programs, such as the loss of a device or an overly long auto-lock setting. This can come in the form of a training program and can be completed with a combination of webinars, user-driven applications, or in-person training classes. Often, employees become proactive advocates of security measures when they understand the important role they play in keeping company data and other assets safe.
Create reasonable boundaries. Enterprises generally do not want to grant access to every device type and to every kind of operating system. Invest in Mobile Device Management (MDM) to allow you to execute a security wipe on a device, or on part of a device. Some MDM tools also allow for a partition between company systems and, for instance, a user’s family photos. Adequate boundaries protect both the user and the security of the enterprise.
Create self-service portals. When an employee becomes a part of your BYOD program, you’ll need an onboarding process. Consider utilizing a self-service portal for provisioning and empower the employee to complete onboarding tasks related to settings and password set-up.
You can also help employees understand policies and security risks by having them sign an end-user license agreement (EULA) at the end of their onboarding process.
When you’re considering a BYOD program, you need a technology partner that understands your business and can help you find the best security approach to protect your assets. Contact us at Cory Communications to learn more about the steps you can take to create a secure environment with BYOD.