Home » Compliance » 5 Things You Need to Know About BYOD and Cyber Security

5 Things You Need to Know About BYOD and Cyber Security

Bring-your-own-device (BYOD) policies can be a boon for organizations that implement them.

Employees can use the same device for both personal and business uses to work from anywhere, which can result in increased productivity. Tasks that employees once had to leave in limbo once they left the office can now be finished outside the workplace and completed without delay.

By using a VPN for employees’ secured connection to corporate networks, BYOD policies can lead to savings on internet services and reduced equipment costs.

U.S. companies and even organizations in the public sector are implementing BYOD models for their workforces. For instance, the Environmental Protection Agency (EPA) recently confirmed that it plans on moving to a BYOD model in the near future. The challenge the agency will face, however, is ensuring that the new devices are properly authorized upon accessing the network.

That challenge is not unique to the EPA.

For the many benefits a BYOD model offers, organizations must understand the many cyber security risks that are involved. Because employees own the devices they use to access corporate data and resources, companies have less control over and ability to monitor these devices, and this calls for a few adjustments in data security.

Major factors for consideration in implementing BYOD include:

  • How an organization will keep data secure and encrypted.
  • What kinds of data can and cannot be accessed.
  • How data can be securely stored on devices and transmitted across the network.
  • How data can be wiped from a personal device upon an employee’s departure or loss of a device.

Additionally, this shift in device ownership from organization to individual means anyone looking to implement BYOD must establish usage policies that keep employees both accountable and informed. Security teams should establish a “whitelist” of apps that mobile devices accessing the network can use. And because there is an ongoing need to meet regulatory standards like FISMA, HIPAA and FedRAMP, organizations must consider the impact to their compliance efforts and make sure their BYOD model does not jeopardize them.

Lunarline’s suite of products and services allows us to enable you with a secure BYOD rollout. Our security engineering team can work with your organization to establish plans that you’re your current environment into account. Meanwhile, our compliance services will help you incorporate the model in keeping with your compliance requirements. Further, Lunarline’s mobile code review helps determine apps’ security profile so organization can create a whitelist of safe apps for personal devices.

Learn more about Lunarline and how we can help your organization adopt a secure BYOD policy by visiting Lunarline.com or contacting one of our security experts today!

About Spence Witten

Spence has somehow survived ten years at start-ups and small businesses without suffering a (major) nervous breakdown. As Lunarline's Director of Federal Sales, Spence actually loves working on proposals. If there were any doubt, this is proof that he is in fact certifiably insane. While his title says "Sales" Lunarline doesn't let him off that easy. We make him do real work, too. Luckily he's a recognized subject matter expert in security policy and loves helping clients navigate their way around tricky security compliance standards. He's also been known to lead a software development initiative or two, though that pretty much always ends poorly for everyone involved. He can be reached at spence.witten@lunarline.com.