more-arw search

Securing Infrastructure for Safe BYOD

Securing Infrastructure for Safe BYOD

The "bring your own device" (BYOD) trend has become one of the more influential corporate IT topics in recent years, especially as smartphone and tablet adoption rates continue to skyrocket. Several studies imply that mobile device adoption rates have increased much faster than virtually any other technology in the past several decades, including personal computers and the internet boom.

Enterprise decision-makers need to ensure that their IT infrastructure is prepared for BYOD, as reports indicate that employees will be using their personal devices for work responsibilities regardless of whether their employers have the controls in place. Further, information governance needs to be the focal point of any budding BYOD strategy, while advanced tools such as mobile device management solutions can be implemented to uphold associated policies.

Securing Mobile Devices
PC World recently reported that containerization has been one of the most popular methods of BYOD control and security thus far, and is characterized by the segregation of personal and corporate data. However, this has become increasingly difficult to accomplish given the behaviors of employees who use smartphones and tablets, as well as the ways in which the devices are being manufactured.

The news provider suggested several methods to ensure security and control in BYOD-enabled workplaces, asserting that the best approaches will be custom-made to fit the needs of each individual business. According to the source, decision-makers need to first decide which information is owned by either the employee or the company, and then put policies in place to make this distinction clear.

Segregation of data is one possible approach, but will not always ensure the most legal processes, and could leave companies at risk for a variety of security issues. PC World explained that companies can avoid problems by taking a comprehensive approach to assessments, and ensuring that executives and IT personnel can know where any and all corporate data is going.

The source noted that training should be a focal point, as each organization should educate employees regarding best practices prior to allowing the use of personal devices. Having clear and comprehensive guidance readily accessible to employees will further strengthen the control executives have over the devices themselves.

Finally, the news provider added that businesses should pick and choose which devices they are willing to support, and outlaw any that they feel represent a major risk. However, the most successful BYOD strategies are created in a user-centric fashion, and as such executives need to work to ensure that as many smartphones and tablets are supported to ensure employees are engaged.

One Step at a Time
ZDNet recently suggested that companies might be moving into the mobility landscape too quickly, and without restraint. The source recommended that companies carry out due diligence and always shore up defenses prior to launching a BYOD initiative, implementing controls such as MDM and other enterprise mobility management solutions to strengthen monitoring capabilities and enforce information governance policies.

By taking a comprehensive approach to BYOD security and information governance, companies can capitalize on the productivity-driving trend while mitigating the threats.