Even those organizations that have already instituted BYOD policies should consider the need for further improvements and modernization as technological needs and capabilities change. Because of all the operational advantages of allowing employees to use their own devices (as well as the difficulties of preventing them from doing so in some cases), enterprises can find themselves embracing this approach to tech without fully preparing for security risks.
"Unsecured network use can offer as much of a threat to organizations as physical risks."
In a piece for BetaNews, Guy Caspi of cybersecurity firm Deep Instinct outlined some of the tactics necessary for mitigating security risks as companies implement BYOD standards. These include backing up important data and verifying that the applications users rely on are safe. Unsecured network use can offer as much of a threat to organizations as physical risks, like lost cell phones.
According to a 2013 report from Cisco, BYOD users stand to save more than an hour and 20 minutes every week in the United States alone, as well as "$350 of value annually per mobile user." This applies specifically to "Basic BYOD," a common version of this approach that doesn't concern itself with a full overarching policy, which the company called "comprehensive BYOD."
Duo Labs, another security firm, recently examined the deficiencies in Windows 8.1 and 10-enabled laptops. In a summary on the company's website, Senior Security Researcher Mark Loveless noted that assuming preset tech standards are safe could expose users to damage.
"Default laptop settings and protocols make it easier for an attacker to sniff, grab, view and redirect the unsuspecting laptop user's traffic for illicit purposes," he wrote. "Attackers can steal online bank account passwords, view company data and more due to default firewall settings and services that are exposed on the network."
A web based terminal emulator will let businesses mitigate data in an easily-monitored online environment.