Staff must be trained to handle BYOD policies

BYOD policies continue to put networks at risk

With bring your own device (BYOD) employees can, within reason, use the device they truly want. Windows Phone fans can go with a Nokia Lumia, Apple fans an iPhone, while Google lovers can opt for one of the myriad of Android devices on the market.

On the tablet side, one can go with an iPad, a Kindle Fire or another Android tablet, or Windows tablets like the Surface. However, all this personal choice comes at a cost. And with the rise of BYOD, these costs are going up.

BYOD concerns fall into four major categories:

  • Security (including Wi-Fi exploits)
  • Bandwidth Abuse
  • Data Leakage
  • Support/Help Desk Headaches

BYOD remains relatively uncharted IT territory. Combine BYOD unknowns with Wi-Fi uncertainties and you could have real security problems, as the results of a GFI Software survey amongst 1,000 workers in the UK revealed.

Running risks

A staggering 100% of those queried said they use open public Wi-Fi for work activities – and much of this access is from personal devices that likely have a lower level of installed or enabled security than company-issued machines.

Furthermore, 20% of mobile devices have no security enabled; while just 5% have corporate security policies enforced on their devices. While public Wi-Fi presents major security concerns, corporate Wi-Fi presents both security and bandwidth challenges.

More devices on the network means more casual bandwidth being consumed. This can have serious productivity implications. When the network is being saturated with BYOD traffic, it slows to a crawl when trying to serve business needs.

A BYOD environment consists of different machines and operating systems, which all have to be as well protected as company-owned assets. That means they need to be safe from malware, have up-to-date systems software including fixes, and need to be regularly monitored with the ability for IT to take action if the device is stolen, lost or otherwise compromised.

Employers must take initiative

That said, you can have all the best mobile device security and management tools in the world, but without a clear policy and training, it may all be for nothing. Companies with serious security restrictions may opt to not allow BYOD but most businesses are better served allowing some BYOD use.

Not letting employees use their own devices can be a real morale killer. Doing BYOD right means having a policy, training users on it, and sticking to it. A well-designed and implemented policy can help mitigate these issues:

  • Hacker access to a network
  • Infecting a network with viruses and malware
  • Failing to follow compliance regulations, opening a firm up to fines and lawsuits
  • Data theft and improper distribution of confidential information
  • Misuse of BYOD creating help desk nightmares

There are more privacy issues involved in BYOD, as these are employee-owned machines and perhaps should not be monitored and controlled the same way a company-issued PC or device might be. You must tread far more carefully when personal data is in play, even if you intention is to delete confidential company material that may be misused.

Policies are all well and good, but they only work when backed up with training. Users should understand how to create strong passwords and regularly change them, how to lock a device, how to manage security settings, how to use encryption, and how to handle company data.

  • Doug Barney is senior research analyst at GFI Software. Barney was the founding editor of Redmond Magazine, Redmond Channel Partner, Redmond Developer News and Virtualization Review.
Latest in Security
Data leak
Top home hardware firm data leak could see millions of customers affected
Representational image depecting cybersecurity protection
Third-party security issues could be the biggest threat facing your business
A stylized depiction of a padlocked WiFi symbol sitting in the centre of an interlocking vault.
Broadcom warns of worrying security flaws affecting VMware tools
Android Logo
Devious new Android malware uses a Microsoft tool to avoid being spotted
URL phishing
HaveIBeenPwned owner suffers phishing attack that stole his Mailchimp mailing list
Ransomware
Cl0p resurgence drives ransomware attacks to new highs in 2025
Latest in News
Buzz Lightyear Space Ranger Spin Rennovations
Disney’s giving a classic Buzz Lightyear ride a tech overhaul – here's everything you need to know
Hisense U8 series TV on wall in living room
Hisense announces 2025 mini-LED TV lineup, with screen sizes up to 100 inches – and a surprising smart TV switch
Nintendo Music teaser art
Nintendo Music expands its library with songs from Kirby and the Forgotten Land and Tetris
Opera AI Tabs
Opera's new AI feature brings order to your browser tab chaos
An image of Pro-Ject's Flatten it closed and opened
Pro-Ject’s new vinyl flattener will fix any warped LPs you inadvertently buy on Record Store Day
The iPhone 16 Pro on a grey background
iPhone 17 Pro tipped to get 8K video recording – but I want these 3 video features instead