Bring Your Own Disaster
According to a recent survey, as many as 85 percent of organizations are embracing bring your own device (BYOD) in the workplace. But BYOD could mean “bring your own disaster” to some companies over the lack of control over employee personal devices.
Potential Pitfalls of BYOD Devices
There are several reasons why the use of BYOD devices can cause issues for companies. Here are five of them:
Keeping BYOD Devices From Becoming a Disaster
There are ways to manage the effectiveness of BYOD devices while managing the risks associated with them. Here are three ways companies can keep the use of BYOD devices from becoming a disaster:
Implement a Formal BYOD Policy: According to a recent survey, only 39% of companies have a formal BYOD policy. Having a strong BYOD policy in place can establish the rights for a company to manage employee BYOD devices, helping to ensure a required level of functionality and security and giving the company the right to access a device for employees suspected of wrongdoing.
Periodically Conduct Mobile Device Assessments: As we discussed in our post, “If Your Mobile Device Was Hacked on January 1st, You May Be Just Finding Out About It Now”, the average time to detect and contain a data breach is 280 days! Mobile devices have become perhaps the most common source of those data breaches and your employees may have already been hacked and not yet realize it. Assessing employee mobile devices periodically can shorten the time to identify devices that have been compromised, reducing potential damage resulting from a data breach. Conduct Mobile Device Forensics to Identify Fraud: When employee bad acts are suspected, those employees will invariably try to cover their tracks by deleting information on their mobile devices. A forensics examination can uncover those efforts, which is why it was ordered twice in this case “Mobile Device Forensic Discovery: Here’s a Case That Illustrates the Importance”.
Conclusion
The use of BYOD devices can be a disaster for companies, especially if that usage isn’t properly managed. There are ways to manage the effectiveness of BYOD devices while also keeping the risks associated with use of them managed. You can take the “disaster” out of your employees’ use of BYOD devices!
Next time, we will discuss the parameters associated with an effective BYOD policy.
For more information about Forensic Discovery’s Mobile Compromise Assessment services, click here.