It used to be that you went to work, used your company issued computer and telephone, and then went home for the day. As cell phones and other mobile devices grew in popularity, you might have received a work-issued device to get work done on the go.

These days, nearly everyone has a smartphone and perhaps another mobile device they want to use for work as well as on personal time. Not only is it easier to manage— one number, one contact list, one set of applications—but some companies actually see some savings by allowing employees to use their own devices and reimbursing them for a portion of the cost.

However, in the BYOD (Bring Your Own Device) world, not all is that simple. When employees use their personal devices, they open up security risks to the company’s computer systems. Something as simple as a malware program acquired through social media on your own time can wreak havoc on the organizational computer system, never mind the risks of data theft, viruses or lost devices.

As a result, BYOD presents some unique challenges for IT security professionals and often requires an IT security degree to understand and mitigate the risks.

Issues with BYOD Security

There are several issues that are quite common among those using their own devices. Among them are:

Data Access

It’s rare that an organization will allow any device to access any part of the network without some sort of authentication or security process. However, even with some protocols in place, the risks can still be great. Some IT security departments limit access to network on mobile devices, as well as place strict requirements on the security features of the device in order to protect the network and its data.

Improper Encryption

Many organizations employ encryption when storing and transferring data offsite or when employees access the network from their mobile devices. Without the encryption key, it’s impossible for anyone to read the data—an important safety protocol when dealing with sensitive or proprietary data.  In many cases, mobile devices lack the proper encryption software, and unless users allow their IT department to update the encryption program, the device presents risks.

Harmful Downloads

Many companies ban employees from using social media or other non- work related sites on company owned devices for reasons related to productivity and network safety. For example, many criminals target Facebook as a means for delivering harmful malware or virus programs. When employees use their personal devices, they may inadvertently download harmful programs that could attack the entire company network, leading to theft, a reduction in speed or other problems. And it’s not just social media. Because the employee owns the device, he or she can use the device for personal activities as well as work, not considering the effects on the work network. For example, while doing research on a tablet about leadership degree programs, an employee might visit a site that installs spyware or malware that would have been blocked had the search taken place on a secure company computer.

Theft or Loss

As anyone who has ever lost his or her cell phone will tell you, it sucks. If you use that device for work, it’s even worse, since the potential for sensitive company information to fall into the wrong hands increases greatly. When employees use their own devices, IT security departments have to take precautions such as limiting access to the network and setting up user identification protocols that will prevent unauthorized access to the network in the event of theft or loss. Not to mention, when an employee leaves the company, the security team must have a procedure in place that ensures former employees no longer have access to private company data.

Using mobile devices for work is a boon to both employees and businesses. Smartphones and tablets allow employees flexibility in their work environment, and allow them to be more productive when they have to be away from the office. However, without proper security measures, BYOD can mean disaster for the organization. In light of this, IT departments must stay on top of all the latest in threat management and security protocols.

About the Author:

Jordan Pinkas is a technology journalist and video game nerd.  He has worked from home since he was 17 years old and never plans on wearing a tie.

There Are iPod Screen Repair OptionsThere Are iPod Screen Repair Options
Fri, Feb 15th, 2013 - Yoga Sdr

Millions of people have an iPod, and there are millions of ways in which yours can get damaged. Most [ ... ]

Double Tap to Wake, Tap Twice to Wake your Nexus 6 UpDouble Tap to Wake, Tap Twice to Wake your Nexus 6...
Sun, Dec 21st, 2014 - Yoga Sdr

The first version of Nexus 6 has a cool feature named “Double-tap to wake” to wake up. The funct [ ... ]

Use A Portable Time Clock In A Small OfficeUse A Portable Time Clock In A Small Office
Tue, Oct 28th, 2014 - Yoga Sdr

When people are trying to keep track of all their employees in a small office, they need to make sur [ ... ]

15 Top Tips For A Beginner To Start With Different Types Of Blogging15 Top Tips For A Beginner To Start With Different...
Mon, Oct 29th, 2012 - Yoga Sdr

There are different ways to blog for your readers from different phases of the society. Some blogs a [ ... ]

Signs Your Hosting Company StinksSigns Your Hosting Company Stinks
Fri, Oct 04th, 2013 - Yoga Sdr

You can’t throw a rock on the Internet without hitting a hosting company. They’re everywhere and [ ... ]

Reputedly, Sony Will Release 12 Inch Tablet Early Next YearReputedly, Sony Will Release 12 Inch Tablet Early ...
Mon, Nov 03rd, 2014 - Yoga Sdr

The rumour is from Taiwan as the headquarters of Sony. It is reported that Sony will release 12 inch [ ... ]

Understanding Google Authorship for Your Blog SuccessUnderstanding Google Authorship for Your Blog Succ...
Sun, Nov 11th, 2012 - Yoga Sdr

What is Google Authorship & Why was it Created?
Google Authorship is the ability to link a Google [ ... ]

How to Use Twitter for More than Just TweetingHow to Use Twitter for More than Just Tweeting
Thu, Oct 18th, 2012 - Yoga Sdr

Twitter is a social networking site that was introduced over 6 years ago and it has continued to spi [ ... ]

Hot Apps Learning

Just Backup Your Online Data Now
Sun, July 15th, 2012 - Yoga SdrJust Backup Your Online Data Now

With everyone keeps going online, the internet has to be the best and most perfect place to conduct  [ ... ]

Other Articles