Advertisment

Tips to note while managing BYOD integration

Recommendations that should be borne in mind when connecting employees’ personal devices to corporate IT networks

author-image
Sanghamitra Kar
New Update
ciol phone security

BANGALORE, INDIA: According to a survey conducted by Kaspersky Lab in conjunction with B2B International, around half of the consumers surveyed also use their devices for work. However, only one in 10 is seriously concerned about keeping work information safe should cybercriminals gain access to their device.

Advertisment

One way or another, many employees of large and medium-sized companies use personal mobile devices for work. 36pc of respondents store work files on them, and 34pc keep work-related email messages.

Recommendations that should be borne in mind when connecting employees’ personal devices to corporate IT networks:

  • BYOD integration should be regarded as a specific project; this is especially true for large businesses. Every last detail of the integration process should be designed beforehand; and this should ideally include an infrastructure audit, a design stage and a pilot implementation.
  • To effectively protect mobile devices, it is important to use a comprehensive solution that ensures security across the entire corporate network, not one that focuses only on mobile devices. Without this, compatibility problems may arise and create extra work for system administrators.
  • Managing mobile devices in a large business requires additional skills over and above those demanded by routine system administration. It is worth ensuring there are appropriately qualified IT security specialists on the team. These can provide centralized management for all mobile devices within the corporate network, ensure that all mobile applications are installed, removed and/or updated via dedicated corporate portals, and regulate data access levels and employee privileges.
  • Most importantly, the business needs to develop robust scenarios for how to remove personal devices from the corporate network if they are lost or stolen, or if an employee leaves the company. A procedure should be developed to remove confidential corporate data from these devices and block access to the corporate network.
tech-news security byod must-read