Back to news

What To Include In Your Mobile Device Management Policy

September 11, 2018    |    Cyber Security    |    Private Tunnel

Every Company Needs a Strong BYOD Mobile Policy

Smartphones and tablets are great tools for productivity in the workforce. However, they can cause security concerns. How can you allow your employees the flexibility to work from anywhere with their own devices, while protecting from the dangers of hackers and cybercrime? The solution is a BYOD mobile policy so that employees know how to keep work data safe and secure.

Create a Mobile Device Management Policy

A BYOD security policy is essential for every business — implement these 7 strategies, and you’ll have a strong foundation moving forward:

  1. Set up a secure login. Ensure that phones and tablets require a login to access them, whether it’s a swipe pattern, PIN, or biometric credentials. A lot of people, employees included, intentionally skip setting up passwords to make login faster (and to avoid having to remember complex passwords). However, the seconds saved by not having a password could jeopardize your business down the road: make sure devices are all password protected.
  2. Use the latest versions of software and firmware. The latest versions will have patches and fixes for known bugs and security loopholes. Using outdated versions gives hackers a backdoor to your network.
  3. Immediately report lost or stolen devices. Make sure that in the event of loss or theft, employees are letting you know quickly so that your sensitive business data doesn’t fall into the wrong hands. Make sure you have a strategy in place for wiping the data from the phone. Apple phones can be erased through Find My iPhone. Android phones can be cleared through android.com/find.
  4. Encrypt your devices. Encryption is a fundamental security measure because that means if an unauthorized party tries to access your devices or the content on them, they won’t be able to get their hands on your sensitive information. For steps on how to provide this extra layer of protection to your business, check out our post: HOW TO UP YOUR PRIVACY GAME BY ENCRYPTING YOUR DEVICES.
  5. Require VPN use when accessing networks outside of the company. Whether from public WiFi in coffee shops, airports, hotels or from an employee’s home network, require that they use a VPN to gain access to their work data. Not only will it encrypt their data, protecting it from snoopers and hackers using the same WiFi, but you can also provide them full access to email, network folders, even printers, with the right VPN setup.
  6. Don’t allow rooted or jailbroken devices. If employees choose to do this to their personal device, let them know that they cannot use it for work purposes. These devices have unauthorized access and elevated privileges within the device system, which remove security features built in by the manufacturer. According to OWASP (Open Web Application Security Project), doing so can “allow malware to bypass many of the device’s built-in security features… Mobile devices now hold more personal and corporate data than ever before, and have become a very appealing target for attackers.”
  7. Use Mobile Device Management (MDM) software to get a complete picture. Keeping track of all of the mobile devices allowed can be done within the framework of good MDM software. They provide administrators with tools to track what the devices are accessing as well as managing updates, locating lost devices and remote wipes.

You can allow BYOD within your organization, but only by using a well-structured BYOD mobile policy. Dr. Engin Kirda, with malware protection provider Lastline, told ZDNET, “Devices should not be able to directly access sensitive resources, and access should only be allowed to some organizational resources through VPNs.”

Better Safe Than Sorry