July 07, 2015
BYOD the norm at your workplace? Read this before it's too late!
Does your organization's policy subscribe to the latest fad of allowing employees to use their own smartphones, tablets and laptops at work, rather than devices provided by the company? If yes, then here are a few things you should know and implement before it is too late.
BYOD (bring-your-own-device) no doubt has its pros. It keeps employees happy and engaged with devices that they understand well and reduces the technology costs of firms. However the cons far outweigh these benefits.
For example, allowing your employees to have email pushed to their personal device, exposes your organization to new areas of vulnerability. Information security is compromised whenever employees leave their devices unlocked or when they lose them / have them stolen.
A good way to protect your organization's data is to speak with your IT staff / consultant about installing "remote wipe" software on devices in order to wipe a lost / stolen device. You will also need to implement a policy that requires employees to secure their device at all times, using a password.
Also consider implementing an antivirus program on all personal devices. To prevent the unauthorized transfer of data from one of these devices, IT can implement policies to disable printing or access to local drives and USB storage.