The term “BYOD” has become nearly ubiquitous as a disruptive and emerging technology trend. But what is BYOD exactly, and what security issues does it pose for the organization?
Here’s a short primer on “What is BYOD?” and an overview of ways to manage this growing trend more securely.
What is BYOD?
BYOD stands for “Bring Your Own Device.” BYOD is a fast-growing trend among enterprises, where employees increasingly want to access network resources with their personal devices.
What is BYOD’s biggest benefit?
BYOD offers a number of benefits to both the organization and the employee. By allowing employees to use personal devices like smart phones, tablets and laptops, organizations can realize an increase in productivity, a reduction in IT costs, greater support for the mobile workforce, and improvement in employee satisfaction.
What is BYOD’s most significant security risk?
Security is the biggest issue for enterprises implementing BYOD programs. From ensuring that sensitive information is protected and adhering to government and industry regulations, BYOD poses a number of enterprise data protection challenges for organizations large and small.
What is BYODpolicy?
BYOD policy provides answers to questions like:
- How will personal devices be secured?
- Where will data on BYOD devices be stored?
- What happens when employees leave the organization or violate BYOD policy?
- How much privacy will the organization afford to employees using their own devices?
- How will the organization provide technical support for employee devices?
What are BYOD best practices for reducing risk?
Some common best practices for securing devices and reducing BYOD risk include:
- Using password-protected access controls.
- Keeping OS, software, firmware and applications up to date.
- Backing up data on devices.
- Controlling wireless network and service connectivity.
- Remote wiping services when devices are lost.
- Refraining from storing personal financial data on devices.
- Deploying mobile antivirus software and scanning.
- Using Mobile Device Management (MDM) software and network security tools to implement security settings.
What is a BYODsecurity testing solution?
Application security testing can also play a role in ensuring that BYOD programs remain secure and effective. By testing mobile applications to identify malicious software and potential vulnerabilities like website SQL and cross site scripting, organizations can more easily remediate issues and prevent costly security failures.
CA Veracode can help. With automated mobile application security testing solutions, we enable developers and IT teams to quickly test mobile apps by scanning binaries in compiled applications, third-party components, legacy applications and commercial software to find and fix flaws more quickly and cost-effectively.