Bring your own device (BYOD) is now a permanent feature of the IT landscape. This means that mobile devices have become the next target for criminals looking to access information and networks illegally.
To avoid becoming a victim and potentially compromising vital business information, organisations should implement a BYOD strategies that prevent unauthorised access to information.
The need to control IT budgets, ensure productivity and support flexible working hours drives BYOD, with staff bringing in their own smartphones, tablets, and even PCs for business use.
However, IT teams without a consistent security and backup policy are likely to face mounting concerns as multiple BYOD devices are linked to corporate networks and employees are increasingly access data from any place, over any device.
“Every single mobile device represents an endpoint where data could be lost, stolen, or compromised,” says Lincoln Goldsmith, general manager A/NZ, Acronis.
In fact, Gartner predicts that 38 per cent of companies will rely exclusively on BYOD policies by 2016, with 85 percent of businesses expected to use some form of BYOD program by 2020, and that data breaches will shift to tablets and smartphones by 2017.
According to Goldsmith, these trends illustrate the growing importance of BYOD security.
“An effective data protection strategy should incorporate a solution that lets IT departments monitor and correct BYOD security situations and disasters remotely, while preventing unauthorised individuals from gaining access to confidential company information,” he adds.
“A reliable data protection solution for BYOD environments should also prevent employees from accidentally sharing information with others by implementing permissions and sharing restrictions.
“At all times, you should be able to tell who accessed what information and when.”
Goldsmith says a BYOD policy can benefit businesses by reducing costs on hardware and improving productivity.
For employees, it can lead to better data protection and often improve ease of use for applications. However, a consistent BYOD data protection policy should strike a sound balance between access and restriction for both employees and employers.