5 ways to secure the network from BYOD threats

News and Insights

5 ways to secure the network from BYOD threats
This article first appeared on Best in UC. Cybercriminals are setting their sites on new targets in 2012. The upcoming New Year will see cycbercriminals act with more persistency and sophistication, focusing on mobile and cloud computing, according to Trend Micro and its 12 Threat Predictions for 2012. The report points out that:
  • The real challenge for data center owners will be the increasing complexities of security physical, virtual and cloud-based systems.
  • Security vulnerabilities will be found in legitimate mobile apps, making data extraction easier for criminals.
  • More hacker groups will pose a bigger threat to organizations that protect highly sensitive data.
First and foremost for most organizations, however, is the prediction that security and data breach incidents will force companies to face bring-your-own-device (BYOD) challenges. Why? Most of the mobile devices consumers choose do not have the kinds of intensive security and management controls that IT pros need to protect a business. So if your employees want to use their mobile phones, tablets and other mobile devices, what should your business do? Consider these strategies for locking down the network – and the mobile devices that contain critical corporate information.
  1. Create an acceptable use policy. Employees need to know what is expected of them. If they request access to the corporate network using their personal devices, require employees to sign an Acceptable Use Agreement. This will lay out IT requirements and shared responsibilities.
  2. Allow only role-based access. Role-based solutions enable the IT department to give mobile users access based upon their job requirements. This keeps critical data secure, while enabling higher levels of productivity.
  3. Install software that enables remote wipe and lock. If a device is lost or stolen, your business needs its information deleted. Install a remote wiping software, or require employees to install the software, on BYOD devices. If a device disappears, business data can be deleted by IT.
  4. Leverage location tracking. With the right mobile device management software, your IT department can send an alarm to a device, or even determine where the device can be found. If it’s not in possession of the rightful owner, the wipe and lock technology can protect corporate data.
  5. Help your help desk. With the right solutions, your company’s IT help desk can provide the support users need across a wide number of mobile devices. Make sure your IT experts know how to secure, access and support mobile devices, so that your enterprise’s information will remain safe while workers increase their productivity.
  1. http://www.amarkonline.com

    Hi terrific blog! Does running a blog like this require a
    lot of work? I’ve very little understanding of coding but I had been hoping to start my own blog soon.
    Anyways, if you have any recommendations or tips for new blog
    owners please share. I know this is off topic however I simply wanted
    to ask. Many thanks!

Email Us or Call 1-800-345-4211