Security Best Practices for Byod Policies
Bring Your Own Device (BYOD) policies allow companies to provide their employees with the devices they prefer while reducing costs associated with buying new equipment. On the other hand, BYOD also brings its own set of security risks.
Cover your webcam
- Theft or loss of devices – Employees often take their personal devices everywhere they go. It means that there's a higher chance that devices, as well as their data, could be lost or stolen.
- Man-in-the-middle (MITM) attacks– Cybercriminals intercept information transmitted between employees' devices and their employers' networks.
- Jailed devices – jailbreaking is the process of taking away the limitations placed on a device by its manufacturer so that you can install unauthorized third-party software. This increases the risk that an employee might inadvertently install malware on their own personal devices.
- Security vulnerabilities – if employees have out-of-date operating systems and software on the devices they use at work, cyber criminals could exploit these vulnerabilities to gain unfettered access to company systems.
- Malware – A personal device that has become infected with malware can infect other devices that are connected through the company’s network and cause data loss or downtime.
To mitigate these risks you need to devise a BYOD security strategy that works for both your business and your employees' needs. Here's what you should do:
1. Set passwords on all BYOD devices
To prevent unauthorized access to company data, enforce the use of passwords on every device and account used by employees. Passwords should be strong; contain letters, numbers and symbols; and are longer than 12 characters. You should also consider implementing multi-factor authentication (MFA) to add an additional layer of security by using something like a fingerprint scan or temporary password sent via email.
2. Blacklist unsanctioned applications
Blacklisting involves preventing certain apps from being installed on company-owned devices that are used for business purposes. These include applications like games, social network apps, and third-party file-sharing platforms. A simple way to block apps is by using a mobile device management (MDM) platform that allows IT admins to secure and enforce policies for enrolled devices.
3. Restrict data access
On both personal and corporate devices, adopt the principle of least privilege. A user is able to access just the data and software they need to perform their job. This can help prevent some types of malware from affecting your computer and limit the impact of a data breach.
4. Invest in anti-malware software
Malware protection software identifies and removes malware from devices before they cause any damage. The best anti-virus software is usually backed by the most recent threat intelligence databases and uses behavioural-based detection techniques to detect any traces of malware.
5. Backing up device data
A well-thought-out BYOD security policy can help minimize the risks associated with employees using their own devices for business purposes. However, if something slips through your defences, you need to be ready with backup plans. Make sure that backups of your data are stored both locally and online so that if anything happens to your device, you can easily recover your files from these backup sources.
6. Educate your staff about security
Most BYOD-related security issues arise from human error. This is why you need to teach your employees about safe mobile use. Teach them how to spot applications that may contain malware, share security threat updates, and secure their devices beyond enabling default settings.
If you're looking for help with protecting your BYO (bring your own) environment, we may be able to help. We're always keeping an eye out for new technologies and innovations related to BYO (Bring Your Own Device) and will recommend solutions that fit your needs. Feel free to contact us with any questions you may have.
Recent Posts

