风险行业:7 个您需要立即停止的 BYOD 习惯

2015 年 7 月 15 日

You might like it, hate it, or have no idea what to think about it, but BYOD is here, and it's here to stay.You can't change that.But you can make it safer, more practical, and more useful to the organization by stopping these bad BYOD habits now.

1.Not Having a Solid BYOD Policy (or Not Reviewing It Often Enough)

Make it clear what users are and are not allowed to do with devices that hold sensitive company information.Also, make it clear what will happen if they don't comply.
Is your policy written and distributed to all the employees, or just something your team jotted down and stuck in a filing cabinet?The best policies are required reading for every worker and a signed form stating the workers have read and comply with the policy should be filed with the HR department.

2.Not Using Data Encryption

It's surprising how many of the recent data breaches involving high-profile organizations (including numerous government agencies where IT professionals should know better) have involved poor encryption or a complete lack of encryption.High-level encryption is essential today, especially in a BYOD environment.

3.Not Having Strict Authentication Requirements

What requirements do you have regarding multifactor authentication?If you don't require multifactor authentication, at least define and require strong password criteria for worker-owned devices.Just be sure that the various devices on the network are capable of any requirements you put in place regarding special characters.

4.Not Specifying Which Apps are Approved

Which apps can be used for work-related tasks?Which should not be allowed on the devices at all?
Shadow IT, or the installation and use of applications not approved by IT, is a growing problem with BYOD.Shadow IT can be a serious security issue, as well as affect the network performance.Make sure the apps are clearly named and defined, and that there is a procedure in place to have any new apps reviewed and approved or disapproved by IT and/or a manager with IT knowledge and experience.

5.Not Specifying Which Cloud Storage Solutions are Approved

There are numerous cloud storage platforms for mobile devices, such as Google Docs, Apple iCloud, Microsoft OneDrive, etc.Which will you allow?Which does IT deem unsafe?Be sure to specify what is and isn't an acceptable cloud storage platform for work related documents, images, etc.

6.Allowing IT to Collect Personal Data from Employee Devices

A sound BYOD policy has to go two ways.While it does protect the company (particularly the network and systems) from the users, it also needs to provide the user with privacy and protection, as much of the data, apps, etc. are owned by them.Make sure IT workers can't collect what they shouldn't be.Allow the user their own privacy regarding family photos, personal contacts, private emails, etc.

7.Not Giving IT the Tech to Wipe Devices

Unfortunately, sometimes a user and/or a device goes missing.Phones get lost and stolen, and workers quit or just don't come back one day.IT needs a way to wipe the device of all work-related data so that the company is protected no matter what happens to the user and their device.

Learn more about BYOD and how it can work better in your business by visiting NETSCOUT for more information and resources today.

相关文章

Expert Interview with Dennis Zimmer for NETSCOUT
Have the Cloud and Mobile Got Your Enterprise Out of Control?Grab It Back
数据中心的未来
BYOD:进入退出观望?BYOD 未来的实际情况
您的存储基础设施是否面向未来?
云计算的容量管理:您需要解决的一个被低估的问题
与来自 NETSCOUT 的 Chris Partsenidis 进行专家访谈
什么是“企业解体”,您需要了解哪些方面?
您的信息网络专业人员下一步需要接受哪些培训?
如何改善您的终端用户在使用云端应用程序过程中的体验
网络虚拟化的优点有哪些?
性能改善何时会恶化为破坏性创新?
考虑何时起草 BYOD 政策时的关键事项
软件定义网络在物联网中的关键角色
无边界企业的弊端:对网络性能的影响
 
 
Powered By OneLink