Tag: BYOD program

Mobile security concerns stem primarily from apps

Businesses that have bring your own device (BYOD) programs must protect themselves against this risk.

The mobile security risk that is created by the use of tablets and smartphones in businesses as a result of the use of third party apps has experienced a “monumental increase” according to the results of a recently published report.

What it showed as that these concerns have been steadily and considerably growing.

This is the case, said the report, even in the activation of enterprise apps that have greater mobile security complexity, particularly in terms of secure browsing. This information was published within the Q1 2014 Mobile Index Report that was issued by Good Technology. It also revealed that organizations are actually trying to take back control over their risks by leveraging enterprise apps that do provide greater protection.

The data for this mobile security report is gleaned from the activation tracking done by Good Technology.

That company has tracked activations over mobile devices and platforms and then leveraged its findings from over 5000 of its customers around the world. Within the report, it was explained that companies have called IT their leading concern for this year. Moreover, there has been a considerable 57 percent growth rate (quarter over quarter) in the activations of secure enterprise apps. This is an increase over 54 percent in the previous quarter and 43 percent in the one before that.Mobile Security and Apps

It was also underscored by Good Technology that these are “not surprising” results. The Ponemon Institute published the 2014 State of Endpoint Risk report which also placed the spotlight on risks connected with the use of mobile devices such as tablets and smartphones. It identified third party apps as the leading risk faced by business IT departments.

The Good Mobility Index Report indicated that the total number of activations of browsing apps with heightened mobile security throughout the customer base of Good Technology saw an unbelievable 2900 percent increase during this quarter. This brought it to the app category that is fifth most activated. In previous quarters, it hadn’t even made it into the top ten most activated lists.

3 Ways to Balance the Risks and Rewards of BYOD

Adopting ‘Bring Your Own Device’ (BYOD) policies has proven to be effective in increasing employee productivity in most workplaces and it also saves employers money by releasing them from the responsibility of buying hundreds or thousands of company-issued devices. For this reason, it is expected that more than half of U.S. employers will adopt BYOD by 2017, according to Gartner. Trying to keep mobile devices out of the workplace today is like trying to keep ants away from a picnic — it can’t be done. Companies have to either find a way to work with people using their mobile devices for work purposes, or consent to knowing employees are using their devices anyway, and presenting a huge security risk. However, security can be managed, and managed well. Many companies, such as IBM, are already doing it. Here are three ways companies can balance the risks and the rewards when it comes to BYOD security at work.

1. Manage the Risk of Lost or Stolen Devices

According to Cisco Systems, lost or stolen devices are one of the biggest BYOD risks. A device used for work can compromise an entire company or organization if it’s lost or stolen and has sensitive work data on it. BYOD program managers should install GPS tracking on all devices. This will let them know the location of a lost or stolen device. Managers must also be given remote access that will allow them to wipe the hard drives clean in case of theft as this is the only way to ensure company information is kept secure.BYOD

2. Keep a Company-Wide Device Policy

There should always be a policy in place that lets employees know the types of devices sanctioned for work purposes. Some companies prefer only one type of device, as this is often easier on IT departments. For many companies, this means Blackberry. Blackberry is known for its exceptional security features, and the company even has an entire service that allows companies to easily manage iOS, Android and Blackberry platforms, if you don’t want to limit your employees.

3. Require Certain Programs and Prohibit Others

Protecting sensitive company data from hackers is essential. For this reason, most employers with BYOD programs require their employees to either download a company-sanctioned security software like McAfee or Norton, or a proprietary company security program, according to Tech Republic. Likewise, some programs and apps are just too full of potential security holes to be allowed. For example, most employers prefer that employees keep social media apps, such as the questionable Facebook Home app, off of their mobile devices, according to CSO. It is too easy for unapproved apps to allow hackers a back door into the device. However, logging in to social media through the site itself on the device’s web browser is typically acceptable as long as anti-virus and anti-spyware software is installed first.

Dana Hudson

Dana is a New York native and small business consultant with a penchant for social media strategy.