centristic
  • Solutions
    • Governance, Risk and Compliance Services
    • Identity and Access Management Service
    • Data Protection & Privacy
    • Cyber & Information Security
    • Attack Simulation
    • Office 365 & Azure Security
  • Services
    • Attack Simulation
    • Cyber & Information Security
    • Data Protection & Privacy
    • Governance, Risk and Compliance Services
    • Identity and Access Management Service
    • Office 365 & Azure Security
  • Support
    • Contact Us
  • Company
+1 (954) 488-2643
  • Solutions
    • Governance, Risk and Compliance Services
    • Identity and Access Management Service
    • Data Protection & Privacy
    • Cyber & Information Security
    • Attack Simulation
    • Office 365 & Azure Security
  • Services
    • Attack Simulation
    • Cyber & Information Security
    • Data Protection & Privacy
    • Governance, Risk and Compliance Services
    • Identity and Access Management Service
    • Office 365 & Azure Security
  • Support
    • Contact Us
  • Company
centristic
  • Solutions
    • Governance, Risk and Compliance Services
    • Identity and Access Management Service
    • Data Protection & Privacy
    • Cyber & Information Security
    • Attack Simulation
    • Office 365 & Azure Security
  • Services
    • Attack Simulation
    • Cyber & Information Security
    • Data Protection & Privacy
    • Governance, Risk and Compliance Services
    • Identity and Access Management Service
    • Office 365 & Azure Security
  • Support
    • Contact Us
  • Company
Blog
Home NEWS Is BYOD Right for your Organization?
NEWSRansomwareTips and Tricks

Is BYOD Right for your Organization?

Roland Rodriguez June 17, 2020 0 Comments

Bring Your Own Device, or simply BYOD remains both a major opportunity and challenge for small businesses and enterprises alike. By following the right approach to identifying BYOD risk and developing an effective BYOD policy it is possible to capitalize on the benefits of BYOD without adding significant risk.

The popularity of devices such as tablets and smartphones, now used by many people in their daily lives, has led to a number of companies, such as IBM, Twitter, and Citrix to allow employees to bring their own devices to work, due to perceived productivity gains and cost savings. The idea was initially rejected because of security concerns but more and more companies are now looking to incorporate BYOD policies.

According to a 2018 study, only 17 percent of enterprises provide mobile phones to all employees, while 31 percent provide to none and instead rely entirely on BYOD. The remaining 52% have a hybrid approach where some employees receive corporate mobile phones and others are expected to bring their own.

Some industries are adopting BYOD more quickly than others. Another recent study of BYOD practices found that the education industry has the highest percentage of people using BYOD for work, at 95.25%.

There are also negatives to the BYOD model.  BYOD has resulted in data breaches. For example, if an employee uses a smartphone to access the company network and then loses that phone, untrusted parties could retrieve any unsecured data on the phone. Another type of security breach occurs when an employee leaves the company and they do not have to give back the device, so company applications and other data may still be present on their device.

So whats my conclusion?

Management teams should plan carefully to create a BYOD policy that allows for flexibility, agility, but most importantly security. Company requirements should dictate how a BYOD policy is developed.  If poorly planned, BYOD can be dangerous to organizations. Personal mobile devices can become a liability without proper precautions. If a mobile device has access to business computing systems, the company’s IT administrator should have control of it.  A BYOD policy helps eliminate the risk of having malware on the network, allowing the management team to monitor all contents of the device and erase data if any suspicious event is captured. Ultimately a strong BYOD plan and policy will enable your workforce to be agile and flexible with how and where they work.

BYOD security Working from home
65
1499 Views
AboutRoland Rodriguez
IT security analyst with Centristic since 2014.
In Socials:
Have you ever received an email from the CEO asking for gift cards?PrevHave you ever received an email from the CEO asking for gift cards?June 17, 2020
Watch out for this Windows Defender Scam!June 25, 2020Watch out for this Windows Defender Scam!Next

Related Posts

Email ScamsNEWSPhishingRansomware

Spot Fake Email Messages Like a Pro

Identifying some phishing emails may not be that easy since the bad guys are always...

Scott White May 26, 2020
Data BreachNEWSPhishingRansomwareSecurityTips and Tricks

Home Office Security – Never Too Late to Evaluate

We are past the point of whether or not working remotely, or from home, is something...

Roland Rodriguez November 18, 2020
Recent Posts
  • A zero-day vulnerability was discovered in Google Chrome 
  • Microsoft Windows Support Diagnostic Tool (MSDT) Remote Code Execution Vulnerability
  • Cybersecurity Threat Advisory: BlackMatter Ransomware
  • CISA Launches Campaign to Reduce the Risk of Ransomware – Centristic Launches Campaign to Eliminate the Risk
  • 9 Cybersecurity Tips to Keep Your Device and Data Safe
Categories
  • Data Breach
  • tipsEmail Scams
  • HIPAA
  • newsNEWS
  • tipsPhishing
  • phishRansomware
  • Security
  • Tips and Tricks
  • Uncategorized
Search our Site

Centristic delivers the industry’s most complete IT security and secured solutions to small cap business. Whatever your IT security needs and goals, and wherever you’re starting,

Quick Links
  • Solutions
  • Services
  • Support
  • Company
  • Blog
Get In Touch

Adress:
5645 Coral Ridge Dr #230 Coral Springs, FL 33076-3124
Phone:
+1 (954) 488-2643
Business Hours:
Monday – Friday: 9am to 6pm
Saturday – Sunday: Closed

Copyright © 2020 Centristic. All Rights Reserved