More commonly known as BYOD, Bring Your Own Device can bring a lot of benefits to your business. The obvious one is of course by allowing your staff to use their own mobile devices within the business you don’t have to bare the capital expense whilst still benefitting from the increased productivity it will yield.
However allowing your staff to use their own devices does have a downside. By allowing anyone to attach anything to your network you can create a lot of security vulnerabilities. These vulnerabilities can have significant consequences because of the value of the information your business holds, whether it be client data, information about your businesses finances or anything else that would otherwise be under lock and key in any other scenario.
This is something we see day in and day out as an IT support company and the good news is whilst it is a risk, if you take the right steps there should be nothing to worry about. So here’s 5 things to check out if you are considering or already have staff connecting to your network with their own phones, tablets or Laptops…
- Create a Policy before procuring technology
Nine times our of ten you will already be using the technology but if you have yet to acquire mobile devices for your staff or give them access to your business network via their own devices then getting your ducks in a row is definitely worth while!
- Devices Audit
It’s more likely you and your staff are already using their own or the company’s mobile devices on the company network. If that’s the case you need to understand exactly where you stand and that means taking an audit of every mobile device that has access to your companies secure data. Once you do you can then create a policy to control the access that device has and monitor it with ease.
- Enrolment Should Be Simple
If you are going to get staff to sign up to a policy for mobile devices, getting them to enrol their devices correctly needs to be a super simple process. If it’s not then it won’t get done and that puts your business, your customers and staff at risk.
- Personal Information it’s a priority
- Monitor and manage automatically
Once a device is enrolled, it’s all about context. Devices should be continuously monitored for certain scenarios, and automated policies should be in place. Is the user trying to disable management? Does the device comply with security policy? Do you need to make adjustments?
Based on the data you are seeing? From here, you can start understanding any additional policies or rules to create.
So, if your staff are using their own devices on your network make sure you are set up right and don’t delay as the consequences can seriously harm your business.