WE'VE GOT YOU COVERED!

The Current State of Handling Device Security in a BYOD system

by Matias Wolff 14, Feb, 2017

Device Security in a BYOD systemThere are many benefits for an institution that applies a BYOD system. Reduced costs, better use of the device’s capabilities, quick use and a shorter implementation. But letting users bring their own devices makes an IT department lose its iron grip of the security and data gathering department, since they won’t have control over it anymore, opening the doors for security breaches and lack of behavioral reports.


While the most common answer to managing device security would be to limit internet usage by blocking ports and certain websites, this trend is not recommended by experts. According to TechRepublic, blocking sites like social media or video websites lowers the morale of the team, making them feel controlled while also wasting the opportunities given by these sites. Imagine having a company that requires communication with users but Facebook is blocked. Sounds like a recipe for disaster.

Without control over the network or Internet usage, each device brought into an institution poses a threat for the data that is being handled. According to a study by HP, 97% of employee devices contained privacy issues, making it easier for data to be stolen if it is not encrypted or properly secured.

That is one of the biggest risks when handling BYOD mobile device management. And you probably know why. Not being able to monitor what went wrong, or why or how until after the damage is done. If a student or employee falls victim to data theft, phishing or a straight out attack there is no way to track it if it was done on their personal computer or laptop.

The best way to keep all devices in the same line, experts say, is to implement a training program to teach the entire team how to use the internet properly. Showing the risks of piracy and how most threats are invisible to untrained eyes (and Antivirus), and explain how malware and phishing methods are distributed over social media. Thus, users will not only be on the lookout for potential threats, but they will also be able to identify if they’ve fallen victim of one of these methods, making it easier to prevent massive theft.

Another method is to run regular checks to the devices being used. If the IT department regularly checks cellphones, laptops and other smart devices for threats, they’ll not only be able to see if there are breaches in the device, but to also implement data encryption to make it harder to steal data from them.

It is very easy to just explain this with words; but there is a catch. Analyzing a device that is brought from outside the office would need  special permission from the owner, a right that is even protected by law in certain countries, so it isn’t absolute. If an employee doesn’t want to have his phone checked, he has all the right to deny permission.

Having too many My Little Pony videos might raise some eyebrowsHaving too many My Little Pony videos might raise some eyebrows

How is BYOD security handled in your workplace?

Device recovery and management

Matias Wolff
Matias Wolff

CMO at Prey. BA in Advertising with a major in Marketing from Universidad del Pacífico. Master in International Marketing at ESMA, Barcelona. 18 years’ experience in multinational companies. I am a volunteer at the Endeavor program, and teach Integrated Marketing Communications at the Masters in Innovation program, Universidad Católica de Chile.
Let's connect:   

check out our

Related Blog Posts

5 Podcasts for IT Professionals

by Matias Wolff March 13, 2017

Being an IT professional has its perks. One thing that some might agree on is that when you work in IT you’re just sitting...

Read More

Asset management & advanced search: wizard's guide to label location

by Matias Wolff February 17, 2017

You’ve realized that an advanced search capacity is a must have tool to track your devices in multiple locations...

Read More

4 Challenges CIOs and IT Professionals will face in 2017

by Matias Wolff February 16, 2017

Hello 2017! Adiós 2016, a year that many wanted to leave behind. But now, a new period is starting, that will bring many..

Read More

IT management: who’s first, the CIO or the CTO?

by Matias Wolff February 10, 2017

Depending on their size and structure, organizations have a Chief Information Officer (CIO) and a Chief Technology Officer..

Read More

Cyber Security Threats  IT Professionals in Education Face

by Matias Wolff February 1, 2017

If the Death Star's plans could be stolen by a bunch of young rebels, what about the strategic data of your educational..

Read More