Upload
simon-golding
View
25
Download
1
Embed Size (px)
Citation preview
How to overcome BYOD security implications
INNOVATING, EMPOWERING, TRANSFORMING
BYOD facts
1 in 2 companies will no longer provide devices to employees by 2017 (Gartner)Organisations must implement policies to help employees keep devices securePositive impact
Provides great flexibility Increases productivity
RisksEmployee device malware can interface with corporate dataA lack of water-tight security can expose the organisation
INNOVATING, EMPOWERING, TRANSFORMING
What to do
1. IT environment AuditDetermine if infrastructure can cope with workforce mobility
2. Implement acceptable use policies to communicate boundaries
3. Implement endpoint protectionKeep Windows network safe with single endpoint agent providing antivirus, web protection, device controlRemoves onus from user and prevents malware and data loss
INNOVATING, EMPOWERING, TRANSFORMING
What to do (cont’d)
4. Install VPN4. 97% employee’s devices contained privacy issues (HP) 5. 75% lacked adequate data encryption (HP)6. Grants access to remote device by verifying that data is
encrypted and permitted5. Invest in Enterprise Mobility Management (EMM) software
4. Monitors and detects risks5. Implement one-time passwords to help prevent malware being
installed unknowingly and keylogging6. Implement remote wiping capabilities
4. Over half of security breaches occur when devices are stolen4. IT Managers can wipe device without user’s permission
INNOVATING, EMPOWERING, TRANSFORMING
SummaryA BYOD program can
Reduce costs Increase productivity
Without hindering securityEducating employees on how to protect devices ensures basic security precautions adoption
Read more on LinkedIn Pulse Download the Sophos White Paper
INNOVATING, EMPOWERING, TRANSFORMING
www.trilogytechnologies.comManaged Services company of the year 2015Business IT Services company of the year 2016