Category: Mobile Security

3 Ways to Balance the Risks and Rewards of BYOD

Adopting ‘Bring Your Own Device’ (BYOD) policies has proven to be effective in increasing employee productivity in most workplaces and it also saves employers money by releasing them from the responsibility of buying hundreds or thousands of company-issued devices. For this reason, it is expected that more than half of U.S. employers will adopt BYOD by 2017, according to Gartner. Trying to keep mobile devices out of the workplace today is like trying to keep ants away from a picnic — it can’t be done. Companies have to either find a way to work with people using their mobile devices for work purposes, or consent to knowing employees are using their devices anyway, and presenting a huge security risk. However, security can be managed, and managed well. Many companies, such as IBM, are already doing it. Here are three ways companies can balance the risks and the rewards when it comes to BYOD security at work.

1. Manage the Risk of Lost or Stolen Devices

According to Cisco Systems, lost or stolen devices are one of the biggest BYOD risks. A device used for work can compromise an entire company or organization if it’s lost or stolen and has sensitive work data on it. BYOD program managers should install GPS tracking on all devices. This will let them know the location of a lost or stolen device. Managers must also be given remote access that will allow them to wipe the hard drives clean in case of theft as this is the only way to ensure company information is kept secure.BYOD

2. Keep a Company-Wide Device Policy

There should always be a policy in place that lets employees know the types of devices sanctioned for work purposes. Some companies prefer only one type of device, as this is often easier on IT departments. For many companies, this means Blackberry. Blackberry is known for its exceptional security features, and the company even has an entire service that allows companies to easily manage iOS, Android and Blackberry platforms, if you don’t want to limit your employees.

3. Require Certain Programs and Prohibit Others

Protecting sensitive company data from hackers is essential. For this reason, most employers with BYOD programs require their employees to either download a company-sanctioned security software like McAfee or Norton, or a proprietary company security program, according to Tech Republic. Likewise, some programs and apps are just too full of potential security holes to be allowed. For example, most employers prefer that employees keep social media apps, such as the questionable Facebook Home app, off of their mobile devices, according to CSO. It is too easy for unapproved apps to allow hackers a back door into the device. However, logging in to social media through the site itself on the device’s web browser is typically acceptable as long as anti-virus and anti-spyware software is installed first.

Dana Hudson

Dana is a New York native and small business consultant with a penchant for social media strategy.

Android mobile security feature disabled by Google

One of the privacy control features that had previously been available on smartphones has been removed.

It has just been revealed that Google Inc. has decided to eliminate an experimental Android mobile security feature meant to help users to be able to boost their privacy levels by blocking apps from being able to collect some forms of their data, such as their location and the contents of their address books.

This change will mean that smartphone users of version 4.4.2 of the operating system will not be able to block that sharing.

In order to be able to use certain apps, users will no longer be able to rely on the Android mobile security blocking to stop their personal data from being collected. According to a Google spokesperson, the feature had accidentally been included in the Android 4.3 version (Jelly Bean) that was released last summer.

Many have expressed suspicion concerning the explanation about the removal of the Android mobile security feature.

Android Mobile Security DisabledWhile some have accepted Google’s explanation and are not bothered by the removal of the privacy tool, others are suspicious and don’t feel that the elimination of the feature was the best move when improvement would have been a superior path.

The concern that has now been expressed is that users of smartphones based on the operating system can choose not to upgrade to Android 4.4.2, but this could place them at an increased risk of other types of vulnerabilities that were overcome by the upgrade. This will cause people to have to make the choice between two different types of protection for their devices.

Many third party apps for these smartphones require personal information access, such as location data and phone call information, in order to be used, despite the fact that there is not always an obvious reason why the application would require this data in order to function. The added privacy feature gave users the ability to select which types of data could be collected by a third party application.

Now, the Android mobile security feature providing that ability will no longer be available to users who upgrade to the latest version of the operating system.