centristic
  • Solutions
    • Governance, Risk and Compliance Services
    • Identity and Access Management Service
    • Data Protection & Privacy
    • Cyber & Information Security
    • Attack Simulation
    • Office 365 & Azure Security
  • Services
    • Attack Simulation
    • Cyber & Information Security
    • Data Protection & Privacy
    • Governance, Risk and Compliance Services
    • Identity and Access Management Service
    • Office 365 & Azure Security
  • Support
    • Contact Us
    • Customer Portal
  • Company
+1 (954) 488-2643
  • Solutions
    • Governance, Risk and Compliance Services
    • Identity and Access Management Service
    • Data Protection & Privacy
    • Cyber & Information Security
    • Attack Simulation
    • Office 365 & Azure Security
  • Services
    • Attack Simulation
    • Cyber & Information Security
    • Data Protection & Privacy
    • Governance, Risk and Compliance Services
    • Identity and Access Management Service
    • Office 365 & Azure Security
  • Support
    • Contact Us
    • Customer Portal
  • Company
centristic
  • Solutions
    • Governance, Risk and Compliance Services
    • Identity and Access Management Service
    • Data Protection & Privacy
    • Cyber & Information Security
    • Attack Simulation
    • Office 365 & Azure Security
  • Services
    • Attack Simulation
    • Cyber & Information Security
    • Data Protection & Privacy
    • Governance, Risk and Compliance Services
    • Identity and Access Management Service
    • Office 365 & Azure Security
  • Support
    • Contact Us
    • Customer Portal
  • Company
Blog
Home NEWS Is BYOD Right for your Organization?
NEWSRansomwareTips and Tricks

Is BYOD Right for your Organization?

Roland Rodriguez Roland Rodriguez June 17, 2020 0 Comments

Bring Your Own Device, or simply BYOD remains both a major opportunity and challenge for small businesses and enterprises alike. By following the right approach to identifying BYOD risk and developing an effective BYOD policy it is possible to capitalize on the benefits of BYOD without adding significant risk.

The popularity of devices such as tablets and smartphones, now used by many people in their daily lives, has led to a number of companies, such as IBM, Twitter, and Citrix to allow employees to bring their own devices to work, due to perceived productivity gains and cost savings. The idea was initially rejected because of security concerns but more and more companies are now looking to incorporate BYOD policies.

According to a 2018 study, only 17 percent of enterprises provide mobile phones to all employees, while 31 percent provide to none and instead rely entirely on BYOD. The remaining 52% have a hybrid approach where some employees receive corporate mobile phones and others are expected to bring their own.

Some industries are adopting BYOD more quickly than others. Another recent study of BYOD practices found that the education industry has the highest percentage of people using BYOD for work, at 95.25%.

There are also negatives to the BYOD model.  BYOD has resulted in data breaches. For example, if an employee uses a smartphone to access the company network and then loses that phone, untrusted parties could retrieve any unsecured data on the phone. Another type of security breach occurs when an employee leaves the company and they do not have to give back the device, so company applications and other data may still be present on their device.

So whats my conclusion?

Management teams should plan carefully to create a BYOD policy that allows for flexibility, agility, but most importantly security. Company requirements should dictate how a BYOD policy is developed.  If poorly planned, BYOD can be dangerous to organizations. Personal mobile devices can become a liability without proper precautions. If a mobile device has access to business computing systems, the company’s IT administrator should have control of it.  A BYOD policy helps eliminate the risk of having malware on the network, allowing the management team to monitor all contents of the device and erase data if any suspicious event is captured. Ultimately a strong BYOD plan and policy will enable your workforce to be agile and flexible with how and where they work.

BYOD security Working from home
60
1169 Views
Roland Rodriguez
AboutRoland Rodriguez
IT security analyst with Centristic since 2014.
In Socials:
Have you ever received an email from the CEO asking for gift cards?PrevHave you ever received an email from the CEO asking for gift cards?June 17, 2020
Watch out for this Windows Defender Scam!June 25, 2020Watch out for this Windows Defender Scam!Next

Related Posts

NEWSPhishingTips and Tricks

What is MFA? Multi-factor Authentication (MFA) Explained

While many companies are today working from home, at some point, the workforce will...

Mary Kemper Mary Kemper July 6, 2020
Data BreachEmail ScamsHIPAANEWS

Cybersecurity Awareness Month

The uncertain, the unexpected, and the unknown all allow for hackers to gain our...

Roland Rodriguez Roland Rodriguez October 13, 2020

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Recent Posts
  • Microsoft Windows Support Diagnostic Tool (MSDT) Remote Code Execution Vulnerability
  • Cybersecurity Threat Advisory: BlackMatter Ransomware
  • CISA Launches Campaign to Reduce the Risk of Ransomware – Centristic Launches Campaign to Eliminate the Risk
  • 9 Cybersecurity Tips to Keep Your Device and Data Safe
  • Home Office Security – Never Too Late to Evaluate
Subscribe to our blog
We have lots of stuff for you to read.
Categories
  • Data Breach
  • tipsEmail Scams
  • HIPAA
  • newsNEWS
  • tipsPhishing
  • phishRansomware
  • Security
  • Tips and Tricks
  • Uncategorized
Most Viewed Posts
Search our Site

Centristic delivers the industry’s most complete IT security and secured solutions to small cap business. Whatever your IT security needs and goals, and wherever you’re starting,

Quick Links
  • Solutions
  • Services
  • Support
  • Company
  • Blog
Get In Touch

Adress:
5645 Coral Ridge Dr #230 Coral Springs, FL 33076-3124
Phone:
+1 (954) 488-2643
Business Hours:
Monday – Friday: 9am to 6pm
Saturday – Sunday: Closed

Copyright © 2020 Centristic. All Rights Reserved

Close