We get it (and IT!)

Phone: 1300-728-259 or .

Category Archives: BYOD

4 great tips for BYOD security

Security_July07_ABYOD, or Bring Your Own Device, is one of the most common business trends of the past couple of years. To many, the idea of bringing their own phone, tablet, laptop, or even computer to the office is ideal because it is a system they are undoubtedly familiar with. They may also view personal devices as better than the office models. Even if you don’t allow your employees to bring their own devices to work, there is a good chance they do anyways. However, this could pose a security risk that needs to be dealt with.

What should I do about BYOD?

The first reaction of many office managers and business owners, worried about security threats that could stem from BYOD, is to impose an outright ban of devices. While telling your staff they are not to use their devices for work may seem like a quick and easy solution, you can be 100% sure that there will be employees who ignore this policy and use their personal devices for work regardless.

This could put your business at a higher security risk if the rule is ignored, especially if you don’t implement any security measures to protect your networks and data. In order to minimize the potential threats BYOD can expose your business to, we suggest you do the following:

1. Consider embracing BYOD

Instead of simply banning personal devices in the workplace take a step back and look to see if there are any benefits BYOD can offer. For example, if you operate on razor thin margins and have not replaced hardware in years, there is a good chance your employees will have better systems at hand. This could help you reduce your overall tech costs.

The same goes for phones for your employees. Why not offer to pay for the plan and allow employees to use their own devices? Of course, you are going to want to implement security measures and usage rules, but if this is easily achieved then it may help reduce your overall operating costs. Before you do implement a system like this however, we strongly recommend you read the rest of this article and follow the steps below.

2. Set up separate networks for employee devices

Oftentimes, the main reason employees bring their devices to the office and use them for work purposes, especially when it comes to mobile phones, is because they can happily connect to Wi-Fi for free without using their data plans throughout the day.

Chances are high that because they use the work Wi-Fi on their device for non-work tasks, they simply keep using the device when they are doing work related activities. This could pose a security risk, especially if you run business-critical operations on the same network. You could nip this potential problem in the bud and simply install another Wi-Fi network for mobile devices and non-critical business processes.

It is usually quite affordable to simply purchase another line and the networking equipment to support this, not to mention the fact that it will keep business-critical processes secure from errant malware. As an added bonus, you will likely see increased productivity because the bandwidth demand will be limited, so important data will move quicker.

3. Educate your staff about security

In our experience, the vast majority of BYOD related security risks are exposed by mistake. An employee may have a virus on a personal phone and be unaware of it. When they connect to the network it can then be unintentionally spread to other computers resulting in a potentially massive security breach.

One of the simplest ways to prevent this is to educate your employees about proper mobile safety. This includes how to spot apps that could contain malware, sharing security threat updates, and teaching your employees how to secure their devices. You really need to stress just how important security is to them.

On top of this, contact an IT expert like us for a recommended anti-virus and spyware scanner for mobile devices that users can easily install. Encourage employees to not just install this but to keep it up to date too. Many of these mobile specific scanners are free and just as powerful as desktop versions.

4. Work with an IT partner to establish a solution that works for you

Beyond education and simple network establishment, it is a great idea to work with an IT partner like us. As experts, we keep tabs on the trends and solutions related to BYOD and will work with you to establish a program that works for your company.

It may be that you don’t actually need to integrate BYOD but to update hardware or software to newer versions instead. It could be that there is a simple solution to employees feeling frustrated with slow performance of existing systems at work.

If you do implement BYOD, we can help establish security measures and policies that will ensure your networks and employee devices are secure. The best advice we can give however, is to do this before you start allowing BYOD, as it can be far more challenging to implement and enforce changes when employees are already using their devices at work.

Looking to learn more? Contact us today to see how we can help.

CYOD and BYOD – What are they?

Hardware_Jan20_BMobile devices are a popular tool for many employees, most of whom will at some point use their device for a work-oriented task. In an effort to allow or address this many companies are adopting a BYOD (Bring Your Own Device) policy. There is another similar trend that is also gaining popularity, which is CYOD or Choose Your Own Device.

Below is a brief overview of BYOD and CYOD and the main differences between the two concepts.

BYOD

This is a policy companies adopt that allows employees to bring their own devices to the office and use them for work purposes. While the majority of these plans focus on mobile devices, there are some companies that even allow users to bring their own computers to work on in the office too.

The biggest benefit of adopting this policy is that it can save companies money, because the purchase and maintenance of devices is at the expense of the owner of the device, not the company. This can also lead to higher productivity as employees are using their own device which they are comfortable using.

On the other hand, the biggest drawback of this policy is that it does pose a potential security risk. Because users are accessing company networks and the sensitive data stored within them from their own devices, businesses may see an increase in security breaches. The other downside of BYOD is that it can be tough to control devices and restrict access to data. Companies adopting this policy need to ensure that they have a solid system in place that deals not only with security but how the devices are to be used.

CYOD

Where BYOD is a policy that allows users to bring their own devices to the office, CYOD is a policy that allows users to choose from a number of approved devices. Usually, the company provides these devices and keeps them if the employee leaves or resigns.

The biggest benefit of this type of policy is that you get to pick what devices to offer and also manage them. This means you can limit access to apps, information, and even certain functions. There is also a knock-on effect with this system too, in that your organization will generally be more secure because you manage the devices. You can install virus scanners and other programs that help ensure your networks and the info stored within are secure.

As with most things, there are downsides to this policy too. The biggest is that you likely won’t save any money on hardware, largely because you will have to purchase and maintain this yourself. Another potential disadvantage is that your employees may not be happy with the choices on offer and may want to choose to use their own devices. While this isn’t the biggest negative, it could lead to a decrease in productivity, or if employees use their own devices anyway it could create a potential security issue.

Which policy should companies adopt?

If you are choosing between the two policies you need to pick what suits your company and employees the best. If you are operating on a narrow budget and have older hardware it may be a good idea to look into a BYOD policy. On the other hand, if you are worried about security and ensuring that only approved apps are used a CYOD policy will be a better idea.

If you are looking to adopt a new policy, contact us today to see how we can help.