facebook fixel

Cyber Security: Bring Your Own Device

Key considerations for businesses.

Using a personal device, such as a personal non-work laptop, to carry out work-related activities is known as bringing your own device (BYOD).  One of the reasons that a BYOD policy is so essential in the modern workplace is that employees bring their devices to your office whether you have the policy in place or not. In other words, your employees may be using their own laptops and smartphones with or without your permission. Around half of businesses (47%) say that staff in their organisation regularly do this. If you don’t have a policy in place, you’re just increasing security risks from them using insecure apps to transfer crucial data.

We’ve put together guidance on creating an effective and secure BYOD approach:

 

Create a BYOD policy

Ensure that personally-owned devices can only access the business data that you are willing to share with authorised staff.

Encourage staff agreement

Communicate your BYOD policy through staff training so they understand their responsibilities when using personally-owned devices for work purposes.

Use technical controls

Container applications and technical services such as Mobile Device Management can help you remotely manage personally-owned devices, but they can impact the device’s usability.

Limit the information shared by devices

Staff are used to sharing their information with other users and in the cloud. The automated backup of device data to cloud-based accounts can lead to business data being divulged.

Plan for security incidents

When incidents occur, act quickly to limit losses. Could you remotely wipe sensitive data from a personally-owned device if it was lost or stolen?

Anticipate increased device support

Your services may need to be accessed by different types of devices, so ensure you have the IT support capability and expertise to manage a growing range of devices.

Consider alternative ownership models

Restricted devices may not appeal to some users, so consider giving staff a choice of approved devices that are purchased and controlled by your business.

Understand the legal issues

The legal responsibility for protecting other people’s personal information is with the data controller, not the device owner. It is also worth noting that any device which accesses company or customer data will be under the scope of Cyber Essentials.

If you would like any more information on protecting your business or becoming Cyber Essentials certified, please call our team on 0333 240 1824 (Option 1) or email us at sales@soconnect.co.uk.

Related Posts

Unify your comms with Microsoft Business Voice

Unify your comms with Microsoft Business Voice

Established as one of the most widely used applications, Teams streamlines all internal communication. Microsoft has now added the functionality of external calls and messages with customers, suppliers and partners. Microsoft 365 Business Voice brings together all business communication, making it a truly unified platform.

read more
Password Security: how passwords are cracked

Password Security: how passwords are cracked

One of the primary protections for keeping data secure is the humble password. That's why password security should be a priority in your cyber security strategy. Attackers use various techniques to discover passwords, including using powerful tools available for free...

read more
Broadband Speeds – What is a Megabit?

Broadband Speeds – What is a Megabit?

Do you know your megabit from your megabyte? We know that we can be guilty of putting out the odd bit of technical language related to our products without adequately explaining what things are and what it means, and Broadband speeds are one of these. If you don't...

read more

By continuing to use the site, you agree to the use of cookies. more information

The cookie settings on this website are set to "allow cookies" to give you the best browsing experience possible. If you continue to use this website without changing your cookie settings or you click "Accept" below then you are consenting to this. Our Cookies Policy.

Close