Menu
INSIGHT: How to manage BYOD security effectively

INSIGHT: How to manage BYOD security effectively

BYOD policies only work properly if everyone in the organisation is aware of, and committed to, following the appropriate security policies.

Most companies now let employees use their own devices for business to some extent.

However, Bring Your Own Device (BYOD) policies only work properly if everyone in the organisation is aware of, and committed to, following the appropriate security policies.

“BYOD is a fact of corporate life so the question is how to govern it effectively,” says Rick Bell, Innovation Architect, UXC Connect.

“People are often tempted to bring their own device because the technology is often more advanced than what they are likely to be issued with in a corporate device.

“Often, it’s the senior executives that expect to be able to plug their new device into the corporate network without due consideration for security policies.”

BYOD security policies must take into account that, regardless of the device used, the network must be secured to protect the crucial data on which the organisation relies.

Mobile devices, if not properly secured, can introduce malware and security breaches that can compromise the security of the entire business.

To overcome this, Bell believes organisations must put clear guidelines and policies in place on what types of devices are acceptable and what needs to be done to ensure they are secure.

These policies must be communicated in a formal manner to ensure all employees are aware of the requirements and, potentially, any penalties for non-compliance.

“Corporate network security is vital, and organisations cannot take chances when it comes to introducing new devices into the network,” Bell adds.

“There must be standards and systems in place to maintain that security. For example, a mobile device might include security measures such as encryption, two-factor PIN authentication or containerised applications and data protection.

“Not all consumer devices can do this, which means those devices may not be appropriate for the corporate environment.”

Additionally, Bell says organisational policies should be set and overseen by a committee that includes senior executives from both business and technology.

“Because senior executives often expect to be able to use their personal devices in the business network, it is essential to educate them regarding the risks of doing so,” he adds.

“One of the most effective ways to achieve that is to include them in the steering committee that develops, communicates, and enforces the rules regarding BYOD.

“This can help reduce the risk that executives think the rules don’t apply to them, and most importantly, it espouses the right security-sensitive culture across the organisation by leading through example.

“Policies and standards can be enacted through an enterprise mobility management platform.

“This is fairer on everyone because expectations are set across the board. And it reduces the number of unauthorised devices that can compromise the network.”

By doing this, Bell claims organisations can then leverage mobility initiatives and BYOD policies to deliver the benefits with the assurance that network and information security will be maintained.


Follow Us

Join the newsletter!

Or

Sign up to gain exclusive access to email subscriptions, event invitations, competitions, giveaways, and much more.

Membership is free, and your security and privacy remain protected. View our privacy policy before signing up.

Error: Please check your email address.

Tags BYODUXC Connect

Events

Featured

Slideshows

Meet the Reseller News 30 Under 30 Tech Awards 2020 winners

Meet the Reseller News 30 Under 30 Tech Awards 2020 winners

This year’s Reseller News 30 Under 30 Tech Awards were held as an integral part of the first entirely virtual Emerging Leaders​ forum, an annual event dedicated to identifying, educating and showcasing the New Zealand technology market’s rising stars. The 30 Under 30 Tech Awards 2020 recognised the outstanding achievements and business excellence of 30 talented individuals​, across both young leaders and those just starting out. In this slideshow, Reseller News honours this year's winners and captures their thoughts about how their ideas of leadership have changed over time.​

Meet the Reseller News 30 Under 30 Tech Awards 2020 winners
Reseller News Exchange Auckland: Beyond the myths — how partners can master cloud security

Reseller News Exchange Auckland: Beyond the myths — how partners can master cloud security

This exclusive Reseller News Exchange event in Auckland explored the challenges facing the partner community on the cloud security frontier, as well as market trends, customer priorities and how the channel can capitalise on the opportunities available. In association with Arrow, Bitdefender, Exclusive Networks, Fortinet and Palo Alto Networks. Photos by Gino Demeer.

Reseller News Exchange Auckland: Beyond the myths — how partners can master cloud security
Reseller News welcomes industry figures at 2020 Hall of Fame lunch

Reseller News welcomes industry figures at 2020 Hall of Fame lunch

Reseller News welcomed 2019 inductees - Leanne Buer, Ross Jenkins and Terry Dunn - to the fourth running of the Reseller News Hall of Fame lunch, held at the French Cafe in Auckland. The inductees discussed the changing face of the IT channel ecosystem in New Zealand and what it means to be a Reseller News Hall of Fame inductee. Photos by Gino Demeer.

Reseller News welcomes industry figures at 2020 Hall of Fame lunch
Show Comments