BYOD issues every business should address

Nov 25, 2013

2013-11-25 Mobile User.jpgBYOD practices within business settings are not going away anytime soon. In fact, the trend is only poised to grow as more organizations reap the mobility and flexibility benefits of employees utilizing personal devices for work purposes.

Gartner found that almost 30 percent of enterprise information is stored exclusively on mobile devices, so security for these endpoints should be a high priority for IT managers and business administrators.

According to statistics cited by ZDNet, an estimated 50 percent of businesses will encourage their employees to utilize BYOD strategies by 2017. However, this increase also comes with its own set of security concerns.

While most businesses report worrying about mobile data access and mobile file sharing via a BYOD practice, 70 percent of organizations do not have remote wiping capabilities for all enterprise network-connected devices, stated PandoDaily. Furthermore, 76 percent reported not encrypting data on mobile endpoints, and 87 percent stated their company does not back up sensitive information on smartphones or tablets.

Remote wiping capabilities are incredibly important to the safety of a BYOD practice. Such technology allows administrators additional mobile access control as they have the ability to delete sensitive enterprise information from selected devices. In this way, if an employee is removed from his or her position, or if a smartphone or tablet is lost or stolen, the data contained on such endpoints is not at risk.

ZDNet also advised that company administrators make individual employees responsible for backing up the private data on the device they utilize for BYOD purposes. Workers should ensure that all relevant, up-to-date company information is saved elsewhere so that if a device is lost or stolen, it can be remotely wiped and all files are not lost.

PandoDaily also suggested implementing a managed file sharing system that does not utilize public cloud access for data transfers. In this way, documents and content are not put at risk by mobile employees sharing them through unsecured access points.