Bring your Own Device (BYOD) is a company policy where employees bring their own devices to the workplace to access company resources such as email, databases and files and data servers and personal applications. Also known as bring your own technology the policy expresses a much broader phenomenon as it not only covers the equipment but also the software.
BYOD is making great changes in the business world since around 90% of employees (in developed countries) use their computers in some way to access company information. In most cases companies can not change this trend. Some believe that BYOD helps employees be more productive, others believe it raises the morale of employees as it allows flexibility within the company. However, if controls are not put in place, this practice can be very detrimental to the company as it can lead to vulnerabilities which can expose the information. Malicious applications can breach the network.
One of the biggest drawbacks with BYOD is tracking and controlling access to private and corporate networks. The devices connecting used for BYOD, must have configured wireless security protocol to avoid unwanted access. Mainly WPA2-Enterprise, which is the only level of wireless security that allows the three forms of security: encrypt data in transit and authenticity of user network.
To reduce the risks involved in the adoption of BYOD policy, companies have begun to take some steps to control the security:
1 – Create policies and protocols regarding privacy and security of information access within the corporation.
2 – Using web applications, in this way, both the data and the application resides on a secure Web server, leaving nothing in the user’s computer.
3 – Using MDM Just ensure that security policies and free run in the company.