6
How to overcome BYOD security implications

How to overcome BYOD security implications

Embed Size (px)

Citation preview

Page 1: How to overcome BYOD security implications

How to overcome BYOD security implications

Page 2: How to overcome BYOD security implications

INNOVATING, EMPOWERING, TRANSFORMING

BYOD facts

1 in 2 companies will no longer provide devices to employees by 2017 (Gartner)Organisations must implement policies to help employees keep devices securePositive impact

Provides great flexibility Increases productivity

RisksEmployee device malware can interface with corporate dataA lack of water-tight security can expose the organisation

Page 3: How to overcome BYOD security implications

INNOVATING, EMPOWERING, TRANSFORMING

What to do

1. IT environment AuditDetermine if infrastructure can cope with workforce mobility

2. Implement acceptable use policies to communicate boundaries

3. Implement endpoint protectionKeep Windows network safe with single endpoint agent providing antivirus, web protection, device controlRemoves onus from user and prevents malware and data loss

Page 4: How to overcome BYOD security implications

INNOVATING, EMPOWERING, TRANSFORMING

What to do (cont’d)

4. Install VPN4. 97% employee’s devices contained privacy issues (HP) 5. 75% lacked adequate data encryption (HP)6. Grants access to remote device by verifying that data is

encrypted and permitted5. Invest in Enterprise Mobility Management (EMM) software

4. Monitors and detects risks5. Implement one-time passwords to help prevent malware being

installed unknowingly and keylogging6. Implement remote wiping capabilities

4. Over half of security breaches occur when devices are stolen4. IT Managers can wipe device without user’s permission

Page 5: How to overcome BYOD security implications

INNOVATING, EMPOWERING, TRANSFORMING

SummaryA BYOD program can

Reduce costs Increase productivity

Without hindering securityEducating employees on how to protect devices ensures basic security precautions adoption

Read more on LinkedIn Pulse Download the Sophos White Paper

Page 6: How to overcome BYOD security implications

INNOVATING, EMPOWERING, TRANSFORMING

www.trilogytechnologies.comManaged Services company of the year 2015Business IT Services company of the year 2016