Six tips for a secure BYOD concept

No fear of losing control: This is how companies make themselves and their employees fit for the BYOD approach (Bring Your Own Device). Guidelines regulate the safe use of private devices in the workplace.

© depositphotos
© depositphotos

BYOD, i.e. the possibility of integrating private end devices such as laptops, tablets or smartphones into corporate networks, has long since become part of everyday corporate life. How a Forrester study  shows, the approach will continue to be one of the major IT trends in the future, as software product manufacturer Fabasoft writes. To take advantage of this development and mitigate potential security issues, the company offers six tips:

  1. Risks reveal and inform The first step in a successful BYOD program is to analyze the ways in which risks arising from BYOD can affect the company. Employees should also be informed about possible risks to their personal data and company information.
  2. Expert Group convened: For the implementation of the BYOD program, stakeholders from the company and from the areas of IT and data protection should come together. In this way, the topic can be scrutinized and effectively addressed from different expert perspectives.
  3. Guidelines Set: What rules should apply to the use of mobile devices, tablets and laptops? Are the end devices permitted for private use, for example? If so, what agreements apply in the event of data screening?
  4. Project plan create: The plan should include items such as "remote device management," "application control," "policy compliance and audit reporting," "data and device encryption," and especially "increasing cloud storage security." The latter in particular is seen by security experts as an open gateway for hacker attacks.
  5. Solutions implement: At the beginning of the BYOD program, various small test groups should be formed. They are made up of members of the departments that also provide the expert council. Subsequently, the program is successively expanded.
  6. Solutions new rate Solutions should be re-evaluated at regular intervals in close consultation with trusted providers and consultants. Roadmaps are a valuable tool for evaluation in this context.

Source: Fabasoft

(Visited 65 times, 1 visits today)

More articles on the topic

SECURITY NEWS

Bleiben Sie informiert über aktuelle Sicherheitsthemen – praxisnah und zuverlässig. Erhalten Sie exklusive Inhalte direkt in Ihren E-Mail-Posteingang. Verpassen Sie keine Updates.

Jetzt anmelden!
anmelden
You can unsubscribe at any time!
close-link