Quick Start 15:
BYOD Security Tips
It is becoming clear that allowing workers to use their smart devices
for work-related activities is reaping positive benets for those com-
panies who have said yes to BYOD. ey have denitely been seeing
a strong uptick in worker satisfaction (not to mention saving dollars
by not having to purchase corporate-issued devices). But it can’t be
entered into willy-nilly. For those companies ill-prepared there is a
very strong negative: e fortress for your data security could easily
be breached. What follows are methods for securing against mobile
malware and other risks.
1. e security option exists, but how many users really password
protect their devices—making them unusable until they enter
the password or pin? Your BYOD policy has to strongly state and
enforce this if the device is being used to access and work with
corporate data. A password or pin has to be created and used rou-
tinely. is is step that will protect your data if the device is lost
2. ere should be put into eect a set time that the device will lock and
users will have to re-enter pin or password to gain reentry.
3. Keeping it simple is never a good idea when it comes to passwords.
Your policy should state that all passwords must contain both letters
4. As security products exist that allow companies to remotely wipe
lost or stolen devices, users must agree to this option if you allow
them to use their device for work.