Title: Overview of BYOD Security Issues for Businesses
1(No Transcript)
2Did You Know?
Why Security a key factor?
3BYOD A Real Issue for Businesses
BYOD stands for "Bring Your Own Device" to work
and refers to employee use of their own personal
mobile devices to perform company work
activities. The BYOD phenomenon has raised
serious questions about processes and data
security that each business must address.
4The BYOD Challenge IT departments are facing the
unprecedented challenge of implementing security
procedures for the personal mobile devices of
their employees. This is necessary in order to
keep their networks safe from intrusion, and to
protect company data from being stolen or lost.
5Smart Facts About BYOD
- Nearly 80 of white-collar workers in the US use
their own tablet or Smartphone for work. - 70 of mobile professionals will conduct their
work on personal smart devices by 2018. - By 2016 worldwide shipments of smart phones will
reach 480 million, and 65 will be used for BYOD
6Pros of Flexible BYOD Policies
- Cost savings companies dont have to purchase
mobile devices for employees - Increased employee satisfaction
Cons
- Potential Data Security Issues
- Privacy Concerns
7Why Security a key factor?
Effective tools for BYOD Security
- Mobile device management (MDM) software is
available for IT departments to use for securing
BYODs. This software disables specific features
of devices, like Bluetooth and Wi-Fi. It also
enables companies to wipe stolen or lost devices. - Good Choices Include
- Exchange ActiveSync (EAS)
- Microsoft Windows Intune
8Why Security a key factor?
Issues with Lost or Stolen Devices
Nearly 50 of non-IT employees do not have a
passcode for mobile devices. The greatest impact
on the security of mobile data is lack of
employee awareness. This can be overcome by
having an effective mobile security policy which
includes enforcing strict passwords on BYODs.
9Why Security a key factor?
Malware Threats From BYOD
Did You Know? A lax BYOD policy may result in
malware from employees personal mobile devices
being introduced into your company network.
Precautions
- Limit access for mobile devices to necessary
programs only - Monitor BYOD traffic to ensure that malware does
not pass from BYOD to the corporate servers - Implement device enrollment programs
10For more information about BYOD issues, visit us
online at usainvestigators.com or call us
directly at 301-279-6700.