5 minute read

Adopting A BYOD Policy Amidst The COVID-19 Era

•By Alice Selvan

In the midst of the COVID-19 pandemic, even companies that had said “no” to BYOD have come to terms with it since a fair share of remote work would not even be possible without such a policy. Pandemic or no pandemic, on-the-go data access has always enabled employees to get work done quickly and efficiently. It guarantees better communication with colleagues and improves customer service, and device familiarity brings employee satisfaction and increased productivity. Employees using their own devices also relieve the company of device, licensing, and maintenance costs.

More people adapting to remote work implies more personal devices are accessing business-critical data. Over 72% of organisations lack a plan to secure BYOD devices, or have not yet identified their need for one, and this increases the risk of data breaches and cybercrime.

However, implementing BYOD at an enterprise level comes with its own set of challenges:

• Protecting against cyberthreats

Employees using their own devices for work, or uploading or downloading critical data while connecting to public Wi-Fi networks, allows cybercriminals to get their hands on organisational data. The spike to 4,000 cyberattacks per day since the COVID-19 pandemic started stands as proof of that.

• Keeping up with compliance requirements

With personal and corporate data coexisting on the same device, ensuring employees’ devices adhere to the required compliance policies, like the GDPR, HIPAA, and PCI DSS, can be challenging. Any unapproved transfer of confidential data can cost the company its reputation and lead to severe data protection fines.

• Providing multi-platform device support

Supporting a plethora of devices, including all the different platforms, models, and versions, can be a headache for an IT admin, and it can turn into an even bigger one if an employee uses more than one device for work.

• Securing critical data

Data on corporate devices is easier to protect with the company’s firewall shielding it, but that’s not the case with BYOD devices. Some employees might share their credentials, postpone critical updates, connect to insecure Wi-Fi networks or respond to scams like phishing attacks, all of which endanger corporate data.

• Responding to theft

Mobile devices, especially smartphones, are easily lost or misplaced, and this can end up jeopardising business-critical data.

• Getting employee approval

It might be the company’s data, but it’s the employee’s device after all. Organisations need to strike a balance between monitoring and protecting their data on devices and giving employees their share of privacy.

SOLVING BYOD CHALLENGES

Although BYOD ushers in its own set of challenges, steps can be taken to ensure the policy works effectively both from the employee’s and the organisation’s point of view.

ONBOARDING AND MANAGING VARIED DEVICES

An organisation should agree on a list of approved devices based on each device’s ability to support the required set of approved apps and storage capacity, and the organisation’s ability to provide support for the device itself. Furthermore, userfriendly enrolment methods can be used to onboard and authenticate employees’ devices into the corporate network. Keeping track of all the enrolled devices with access to corporate data is mandatory so that the admin is never caught off-guard.

CONTAINERISING AND SAFEGUARDING DATA

• To ensure that data from personal apps does not mix with that of corporate apps, installing a container or a work profile is a must; this creates a separate workspace to host corporate apps and data. The work container can be further secured by setting up a strong password and restricting users’ ability to share data outside the container. • Organisations can get alerts about rooted or jail-broken devices and take necessary action on them such as performing a data wipe, to protect sensitive information from being leaked. • To ensure that their network is safe from major security threats or vulnerabilities, possibly owing to the use of unapproved Wi-Fi networks, organisations can require employees to connect to a VPN to access corporate resources. • Organisations can block unmanaged devices from accessing their mail servers and further restrict data sharing between managed and unmanaged devices.

HANDLING APPS

A considerable amount of work is done using apps. An MDM solution can simplify the app distribution process for an organisation’s approved set of apps, including testing in-house apps before deploying them to devices. App permissions and updates can be controlled so that users cannot modify settings that allow data transfer through personal apps. Admins can also prevent data leakage by restricting malicious or unapproved apps and blocking data backups to third-party cloud services.

TROUBLESHOOTING DEVICES REMOTELY

For anything from a basic functionality issue to an in-house app crash, a remote troubleshooting session can help admins remotely view and control the device screen, execute commands on the device, and resolve issues in real time.

SECURING CORPORATE DATA ON LOST DEVICES

Locate, lock, and completely or selectively wipe devices remotely if they are stolen to protect important data on the devices from being misused. When an employee leaves the organisation, a corporate wipe can be carried out on the device so that no corporate data is retained.

With ever increasing cybersecurity threats, it becomes difficult for organisations to tackle the challenges that come with implementing a BYOD policy. A solution such as ManageEngine Mobile Device Manager Plus which supports Apple, Android, Windows, and Chrome devices, can be the perfect ally for IT teams. It allows admins to segregate personal and corporate workspaces, provide and manage enterprise-approved apps, and enforce approved corporate security policies to safeguard business-critical resources. Admins can remotely troubleshoot devices, execute location-based actions, and erase data from lost or stolen devices to safeguard confidential information, ensuring data security.

About ManagerEngine

ManageEngine is the enterprise IT management division of Zoho Corporation. Established and emerging enterprises – including 9 of every 10 Fortune 100 organisations – rely on our real-time IT management tools to ensure optimal performance of their IT infrastructure, including networks, servers, applications, desktops and more. The company has offices worldwide, including the United States, the Netherlands, India, Singapore, Japan, China, and Australia as well as a network of more than 200 global partners to help organisations tightly align their businesses and IT.

For more information, please visit http://www.manageengine. com, follow the company blog at blogs.manageengine.com, on LinkedIn at https://www.linkedin. com/company/manageengine/, on Facebook at https://www. facebook.com/ManageEngine/ and on Twitter at https://twitter. com/manageengine

This article is from: