top of page

Example of Listicle Writing

  • Writer: Jessca Rancier-Floyd
    Jessca Rancier-Floyd
  • Oct 9, 2023
  • 3 min read

10 Recommendations for Minimizing BYOD Risks

Ensuring employee devices don’t negate cybersecurity efforts


The accessibility of personal network devices, such as smartphones, tablets and netbooks, has created security issues for businesses whose employees wish to use them to stay connected to work. The convenience of being able to access work emails, files, or even applications from outside the office has outweighed the concern over the security risks that those practices pose, making the concept of “Bring Your Own Device” (BYOD) increasingly common for businesses of all sizes. Managing security for outside devices can be difficult, but it’s not impossible if the following 10 recommendations are adhered to.



1) Create a Self-Destruct Strategy



A self-destruct strategy must be created in case the device is lost or stolen. This often means participating in a locator service, often referred to as a “Find my Device” service, which has the ability to remotely scrub the device of any or all information in the event of an emergency. This step may be the only way to protect sensitive business data from incidents of this nature.



2) Have a Regular Back-Up Schedule



Outside devices that are used for business should participate in regularly scheduled backup sessions to prevent data loss and assist in recovery efforts. This can guard businesses from loss in the event the device is stolen. It also protects the information if the device experiences some kind of failure or denial of service.



3) Implement a Strong Password Policy



This may sound like a no-brainer, but password strength is often the first line of defense for devices from unauthorized access or hacks. If employees are using their own devices, strong passwords should be mandatory and multi-layer authentication should be implemented.



4) Manage the Device’s Wireless Settings



Attention should be given to managing the wireless settings on any device with access to the business’ network or data. Settings should be adjusted so that the user does not unwittingly get connected to outside networks via Wi-Fi or Bluetooth. Devices that auto-connect to open networks create additional security risks as public networks are often utilized by hackers with malicious intent.



5) Update, Patch, and Configure



Participation in regular updating must be mandatory to ensure the operating system, firmware, or any applications on the device are as secure as possible. New patches and configurations close any loopholes that could be used to compromise the device security. Keeping devices up-to-date should be a critical part of any BYOD policy.



6) Optimize the Device’s Access Controls



Access controls and permission settings on all devices should be optimized with the help of the IT department. Personal users are often unaware of the best ways to manage these security features. When access controls and permission settings are configured properly, applications on the device have limited access to information that is not directly pertinent to their use, negating the likelihood they can be used to breach security.



7) Participate in Antivirus Activities



Devices should utilize antivirus software and participate in regular scans. A business’ IT department should advise employees on the appropriate software for their device. Antivirus tools are a simple and affordable way to bolster the security on any network device.



8) Have a “Smart” Use Policy



Users must be educated on smart use practices if a personal device is to have access to your business network. A policy should to be created beyond password strength requirements to advise users on risky behaviors, such as opening suspicious emails, or downloading free apps from “independent” publishers, and being cautious about the kind of information that is stored on the device. User awareness alone can minimize the security risk.



9) Monitor and Audit your Network



Considering the many potential security threats, businesses must be extra diligent with their network. Good practices include monitoring, routine maintenance, and regular network security audits. Businesses that engage in BYOD practices should increase security efforts from the inside if they wish to combat the additional risks that outside devices can pose.



10) Establish a Plan for Departure



In the event an employee quits or is fired, a plan needs to be in place to manage the access to business data from their devices. This must go beyond the “self-destruct” method, which is used for a stolen or missing device, as it will be necessary to remove business information and access while still preserving the former employee’s personal files and photographs. Departure plans can be complex depending on the level of access and number of applications or services the employee uses. Plans should be constructed with the help of the IT department who will be executing them and included in the business’ BYOD policy.



Protecting your business’ network security and maintaining BYOD practices go hand in hand. Following these ten simple recommendations can assist your business in minimizing its security risk. With careful consideration and planning, businesses of all sizes can benefit from the connectivity BYOD practices provide without jeopardizing the security of their network.

© 2023 Hire Jess Today

bottom of page