Companies that use a Bring Your Own Device (BYOD) policy can take initiative to safeguard against security risks through remote wiping. This is the practice of deleting data from a device from a distance and without warning.
Although remote wiping can be useful under certain circumstances, Adrian Kingsley-Hughes reports for ZDNet that this tactic can easily be misused, leading employees to feel like their information has been erased abruptly and for no reason.
Some automated wiping triggers are related to possible hacks or misuse of a device. "Jailbreaking" the operating system (OS), losing the device or repeatedly entering the wrong password are all behaviors that could lead to wiping, according to Kingsley-Hughes.
However, these behaviors could also be caused by something more innocuous or even by accident. This possibility makes communication between the IT department and users important to avoiding mishaps.
In an article for Enterprise Apps Tech, Rick Delgado writes that trust among employees is essential for a secure BYOD plan to work. He says that enforcing an understanding of the rules makes it more likely that users won't abuse BYOD policies, intentionally or accidentally.
"Employees need to realize that BYOD policies aren't no-strings attached agreements," Delgado told Enterprise Apps Tech. "They need to be aware of what's expected of them, and what legal ramifications they might face in the case of negligence or worse, a flagrant abuse of trust and leaking private information."
Part of a stable device management plan hinges on using applications that are safe and proven to work no matter how they are accessed. For companies running off of older mainframes, one answer is a legacy system modernization method that houses classic applications within internet browsers that are usable in any mobile device and offer functionality that way.