SlideShare ist ein Scribd-Unternehmen logo
1 von 13
Brought to you by:

www.advancedbusinesssolutions.com
What is
BYOD???
Bring your own device (BYOD)
(also called bring your own
technology (BYOT), bring your
own phone (BYOP), and bring
your own PC (BYOPC))
refers to the policy of
permitting employees to bring
personally owned mobile
devices (laptops, tablets, and
smart phones) to their
workplace, and to use those
devices to access privileged
company information and
applications.
It’s becoming a BYOD world
and we just live in it

To ensure that you are able to meet the growing
expectations for BYOD/PC and its success, it will
require a combination of policies, technology, and
processes.
BYOD. Give it to me straight.
Pros


Productivity is Up

70% of employees w/smart
phones regularly check their work email.



Increased Employee
Satisfaction

Employees are able to be
mobile and still have access to the files the
need.



Cost Savings

Employees are more willing to
purchase their preferred mobile device.

Cons


Managing Security

Consider the loss of a mobile
device or data ending up in the wrong
hands.



Retrieving Data



Appropriate Use of
Technology

If an employee exits the
company, how would you regain control of
said data?

Not exactly easy to control how
someone uses a personal device.
Establish Clear Policies and Expectations
Once you have
identified your
technology approach,
you will then be able
to create a BYO
policy appropriate to
your needs and set
expectations
appropriately.
Some Points To Consider








Device options/platforms
supported
Is this a company wide program?
Reimbursement
Terms of usage
Support of the device
What happens to data when an
employee exits the company?
Create a Secure and Separate Workspace
Container based
s o l u t i o n s c a n make a
personal device run as if it
was a corporate device. This
way employees are able to
run files in a company
restricted infrastructure. The
container is also
encrypted, which secures
data, even if the device is
lost.
Keep Your Network Protected!
Maintain separate
networks for
employees and
guests. Employees
using personal
devices should use
the guest network &
can only access
company data
through a secure
workspace.
Be Sure To Have A Reasonable Password Policy
Authentication is
important but if the
policy is too complex
(12 characters, no
numbers, only #/@?*,
change every other
week, etc.) it will drive
employees to less
secure behaviors… like
writing it down. Be sure
to balance security w/
productivity.
Address Compliance and Risk Management
Mandates
Addressing this will
minimize risks associated
w/ installing corporate
apps and data. Keep your
company container
completely separate from
personal data so that it is
easily removable if an
employee exits the
company.
A BYOD agreement checklist recommended by the
Security for Business Innovation Council includes:






Ensure that end users are responsible for backing
up personal data;
Clarify lines of responsibility for device
maintenance, support and costs;
Require employees to remove apps at the request
of the organization;
Disable access to the network if a blacklisted app is
installed or if the device has been jail-broken; and
Specify the consequences for any violations to the
policy.

Source: “Realizing The Mobile Enterprise,” Security for Business Innovation Council, published by RSA Security.
To BYOD Or Not To BYOD?
While BYOD can be helpful, it can also be
harmful if not implemented with the right
strategy. Before moving forward, make a
pro/con list and list of questions to see if your
company is ready. Then let us help you build a
concrete strategy that aligns with your
companies overall technology strategy.
502-896-2557
www.advancedbusinesssolutions.com

Weitere ähnliche Inhalte

Kürzlich hochgeladen

Structuring Teams and Portfolios for Success
Structuring Teams and Portfolios for SuccessStructuring Teams and Portfolios for Success
Structuring Teams and Portfolios for Success
UXDXConf
 

Kürzlich hochgeladen (20)

Enterprise Knowledge Graphs - Data Summit 2024
Enterprise Knowledge Graphs - Data Summit 2024Enterprise Knowledge Graphs - Data Summit 2024
Enterprise Knowledge Graphs - Data Summit 2024
 
Structuring Teams and Portfolios for Success
Structuring Teams and Portfolios for SuccessStructuring Teams and Portfolios for Success
Structuring Teams and Portfolios for Success
 
The UX of Automation by AJ King, Senior UX Researcher, Ocado
The UX of Automation by AJ King, Senior UX Researcher, OcadoThe UX of Automation by AJ King, Senior UX Researcher, Ocado
The UX of Automation by AJ King, Senior UX Researcher, Ocado
 
What's New in Teams Calling, Meetings and Devices April 2024
What's New in Teams Calling, Meetings and Devices April 2024What's New in Teams Calling, Meetings and Devices April 2024
What's New in Teams Calling, Meetings and Devices April 2024
 
Strategic AI Integration in Engineering Teams
Strategic AI Integration in Engineering TeamsStrategic AI Integration in Engineering Teams
Strategic AI Integration in Engineering Teams
 
AI presentation and introduction - Retrieval Augmented Generation RAG 101
AI presentation and introduction - Retrieval Augmented Generation RAG 101AI presentation and introduction - Retrieval Augmented Generation RAG 101
AI presentation and introduction - Retrieval Augmented Generation RAG 101
 
Behind the Scenes From the Manager's Chair: Decoding the Secrets of Successfu...
Behind the Scenes From the Manager's Chair: Decoding the Secrets of Successfu...Behind the Scenes From the Manager's Chair: Decoding the Secrets of Successfu...
Behind the Scenes From the Manager's Chair: Decoding the Secrets of Successfu...
 
ECS 2024 Teams Premium - Pretty Secure
ECS 2024   Teams Premium - Pretty SecureECS 2024   Teams Premium - Pretty Secure
ECS 2024 Teams Premium - Pretty Secure
 
AI revolution and Salesforce, Jiří Karpíšek
AI revolution and Salesforce, Jiří KarpíšekAI revolution and Salesforce, Jiří Karpíšek
AI revolution and Salesforce, Jiří Karpíšek
 
Linux Foundation Edge _ Overview of FDO Software Components _ Randy at Intel.pdf
Linux Foundation Edge _ Overview of FDO Software Components _ Randy at Intel.pdfLinux Foundation Edge _ Overview of FDO Software Components _ Randy at Intel.pdf
Linux Foundation Edge _ Overview of FDO Software Components _ Randy at Intel.pdf
 
IoT Analytics Company Presentation May 2024
IoT Analytics Company Presentation May 2024IoT Analytics Company Presentation May 2024
IoT Analytics Company Presentation May 2024
 
Salesforce Adoption – Metrics, Methods, and Motivation, Antone Kom
Salesforce Adoption – Metrics, Methods, and Motivation, Antone KomSalesforce Adoption – Metrics, Methods, and Motivation, Antone Kom
Salesforce Adoption – Metrics, Methods, and Motivation, Antone Kom
 
ASRock Industrial FDO Solutions in Action for Industrial Edge AI _ Kenny at A...
ASRock Industrial FDO Solutions in Action for Industrial Edge AI _ Kenny at A...ASRock Industrial FDO Solutions in Action for Industrial Edge AI _ Kenny at A...
ASRock Industrial FDO Solutions in Action for Industrial Edge AI _ Kenny at A...
 
Connecting the Dots in Product Design at KAYAK
Connecting the Dots in Product Design at KAYAKConnecting the Dots in Product Design at KAYAK
Connecting the Dots in Product Design at KAYAK
 
Speed Wins: From Kafka to APIs in Minutes
Speed Wins: From Kafka to APIs in MinutesSpeed Wins: From Kafka to APIs in Minutes
Speed Wins: From Kafka to APIs in Minutes
 
Choosing the Right FDO Deployment Model for Your Application _ Geoffrey at In...
Choosing the Right FDO Deployment Model for Your Application _ Geoffrey at In...Choosing the Right FDO Deployment Model for Your Application _ Geoffrey at In...
Choosing the Right FDO Deployment Model for Your Application _ Geoffrey at In...
 
WebAssembly is Key to Better LLM Performance
WebAssembly is Key to Better LLM PerformanceWebAssembly is Key to Better LLM Performance
WebAssembly is Key to Better LLM Performance
 
Unpacking Value Delivery - Agile Oxford Meetup - May 2024.pptx
Unpacking Value Delivery - Agile Oxford Meetup - May 2024.pptxUnpacking Value Delivery - Agile Oxford Meetup - May 2024.pptx
Unpacking Value Delivery - Agile Oxford Meetup - May 2024.pptx
 
Optimizing NoSQL Performance Through Observability
Optimizing NoSQL Performance Through ObservabilityOptimizing NoSQL Performance Through Observability
Optimizing NoSQL Performance Through Observability
 
SOQL 201 for Admins & Developers: Slice & Dice Your Org’s Data With Aggregate...
SOQL 201 for Admins & Developers: Slice & Dice Your Org’s Data With Aggregate...SOQL 201 for Admins & Developers: Slice & Dice Your Org’s Data With Aggregate...
SOQL 201 for Admins & Developers: Slice & Dice Your Org’s Data With Aggregate...
 

Empfohlen

How Race, Age and Gender Shape Attitudes Towards Mental Health
How Race, Age and Gender Shape Attitudes Towards Mental HealthHow Race, Age and Gender Shape Attitudes Towards Mental Health
How Race, Age and Gender Shape Attitudes Towards Mental Health
ThinkNow
 
Social Media Marketing Trends 2024 // The Global Indie Insights
Social Media Marketing Trends 2024 // The Global Indie InsightsSocial Media Marketing Trends 2024 // The Global Indie Insights
Social Media Marketing Trends 2024 // The Global Indie Insights
Kurio // The Social Media Age(ncy)
 

Empfohlen (20)

2024 State of Marketing Report – by Hubspot
2024 State of Marketing Report – by Hubspot2024 State of Marketing Report – by Hubspot
2024 State of Marketing Report – by Hubspot
 
Everything You Need To Know About ChatGPT
Everything You Need To Know About ChatGPTEverything You Need To Know About ChatGPT
Everything You Need To Know About ChatGPT
 
Product Design Trends in 2024 | Teenage Engineerings
Product Design Trends in 2024 | Teenage EngineeringsProduct Design Trends in 2024 | Teenage Engineerings
Product Design Trends in 2024 | Teenage Engineerings
 
How Race, Age and Gender Shape Attitudes Towards Mental Health
How Race, Age and Gender Shape Attitudes Towards Mental HealthHow Race, Age and Gender Shape Attitudes Towards Mental Health
How Race, Age and Gender Shape Attitudes Towards Mental Health
 
AI Trends in Creative Operations 2024 by Artwork Flow.pdf
AI Trends in Creative Operations 2024 by Artwork Flow.pdfAI Trends in Creative Operations 2024 by Artwork Flow.pdf
AI Trends in Creative Operations 2024 by Artwork Flow.pdf
 
Skeleton Culture Code
Skeleton Culture CodeSkeleton Culture Code
Skeleton Culture Code
 
PEPSICO Presentation to CAGNY Conference Feb 2024
PEPSICO Presentation to CAGNY Conference Feb 2024PEPSICO Presentation to CAGNY Conference Feb 2024
PEPSICO Presentation to CAGNY Conference Feb 2024
 
Content Methodology: A Best Practices Report (Webinar)
Content Methodology: A Best Practices Report (Webinar)Content Methodology: A Best Practices Report (Webinar)
Content Methodology: A Best Practices Report (Webinar)
 
How to Prepare For a Successful Job Search for 2024
How to Prepare For a Successful Job Search for 2024How to Prepare For a Successful Job Search for 2024
How to Prepare For a Successful Job Search for 2024
 
Social Media Marketing Trends 2024 // The Global Indie Insights
Social Media Marketing Trends 2024 // The Global Indie InsightsSocial Media Marketing Trends 2024 // The Global Indie Insights
Social Media Marketing Trends 2024 // The Global Indie Insights
 
Trends In Paid Search: Navigating The Digital Landscape In 2024
Trends In Paid Search: Navigating The Digital Landscape In 2024Trends In Paid Search: Navigating The Digital Landscape In 2024
Trends In Paid Search: Navigating The Digital Landscape In 2024
 
5 Public speaking tips from TED - Visualized summary
5 Public speaking tips from TED - Visualized summary5 Public speaking tips from TED - Visualized summary
5 Public speaking tips from TED - Visualized summary
 
ChatGPT and the Future of Work - Clark Boyd
ChatGPT and the Future of Work - Clark Boyd ChatGPT and the Future of Work - Clark Boyd
ChatGPT and the Future of Work - Clark Boyd
 
Getting into the tech field. what next
Getting into the tech field. what next Getting into the tech field. what next
Getting into the tech field. what next
 
Google's Just Not That Into You: Understanding Core Updates & Search Intent
Google's Just Not That Into You: Understanding Core Updates & Search IntentGoogle's Just Not That Into You: Understanding Core Updates & Search Intent
Google's Just Not That Into You: Understanding Core Updates & Search Intent
 
How to have difficult conversations
How to have difficult conversations How to have difficult conversations
How to have difficult conversations
 
Introduction to Data Science
Introduction to Data ScienceIntroduction to Data Science
Introduction to Data Science
 
Time Management & Productivity - Best Practices
Time Management & Productivity -  Best PracticesTime Management & Productivity -  Best Practices
Time Management & Productivity - Best Practices
 
The six step guide to practical project management
The six step guide to practical project managementThe six step guide to practical project management
The six step guide to practical project management
 
Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...
Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...
Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...
 

Best Practices For A Secure BYOD Policy

  • 1. Brought to you by: www.advancedbusinesssolutions.com
  • 2. What is BYOD??? Bring your own device (BYOD) (also called bring your own technology (BYOT), bring your own phone (BYOP), and bring your own PC (BYOPC)) refers to the policy of permitting employees to bring personally owned mobile devices (laptops, tablets, and smart phones) to their workplace, and to use those devices to access privileged company information and applications.
  • 3. It’s becoming a BYOD world and we just live in it To ensure that you are able to meet the growing expectations for BYOD/PC and its success, it will require a combination of policies, technology, and processes.
  • 4. BYOD. Give it to me straight. Pros  Productivity is Up 70% of employees w/smart phones regularly check their work email.  Increased Employee Satisfaction Employees are able to be mobile and still have access to the files the need.  Cost Savings Employees are more willing to purchase their preferred mobile device. Cons  Managing Security Consider the loss of a mobile device or data ending up in the wrong hands.  Retrieving Data  Appropriate Use of Technology If an employee exits the company, how would you regain control of said data? Not exactly easy to control how someone uses a personal device.
  • 5. Establish Clear Policies and Expectations Once you have identified your technology approach, you will then be able to create a BYO policy appropriate to your needs and set expectations appropriately.
  • 6. Some Points To Consider       Device options/platforms supported Is this a company wide program? Reimbursement Terms of usage Support of the device What happens to data when an employee exits the company?
  • 7. Create a Secure and Separate Workspace Container based s o l u t i o n s c a n make a personal device run as if it was a corporate device. This way employees are able to run files in a company restricted infrastructure. The container is also encrypted, which secures data, even if the device is lost.
  • 8. Keep Your Network Protected! Maintain separate networks for employees and guests. Employees using personal devices should use the guest network & can only access company data through a secure workspace.
  • 9. Be Sure To Have A Reasonable Password Policy Authentication is important but if the policy is too complex (12 characters, no numbers, only #/@?*, change every other week, etc.) it will drive employees to less secure behaviors… like writing it down. Be sure to balance security w/ productivity.
  • 10. Address Compliance and Risk Management Mandates Addressing this will minimize risks associated w/ installing corporate apps and data. Keep your company container completely separate from personal data so that it is easily removable if an employee exits the company.
  • 11. A BYOD agreement checklist recommended by the Security for Business Innovation Council includes:      Ensure that end users are responsible for backing up personal data; Clarify lines of responsibility for device maintenance, support and costs; Require employees to remove apps at the request of the organization; Disable access to the network if a blacklisted app is installed or if the device has been jail-broken; and Specify the consequences for any violations to the policy. Source: “Realizing The Mobile Enterprise,” Security for Business Innovation Council, published by RSA Security.
  • 12. To BYOD Or Not To BYOD? While BYOD can be helpful, it can also be harmful if not implemented with the right strategy. Before moving forward, make a pro/con list and list of questions to see if your company is ready. Then let us help you build a concrete strategy that aligns with your companies overall technology strategy.