Page 50 - Payout Magazine Online Volume 9.3
P. 50
will need to have more stringent security struggle to keep up with rapidly changing with a BYOD policy. MDM helps to enforce
protocols applied to them. hardware, applications, and network access. security protocols for every device brought
into the corporate IT infrastructure and
Devices which are used internationally will Network monitoring tools will allow IT ensures that only authorized devices can
also be required to comply with the security teams to closely monitor the system and connect.
laws and regulations in the countries where keep an eye on the number and types of
they will be operated. As an example, the devices which are accessing company MDM software can also provide the
EU has recently implemented strict privacy resources as well as the location where they capability to protect against malicious
policy legislation which could impact a BYOD are active. With access to these metrics, applications being downloaded. Many
while the employee is traveling between an IT team will be able to improve security malicious apps are designed to gain access
borders. and ensure the infrastructure is capable of to a device and from there, piggyback onto a
handling the load. corporate server. They can also be used to
Securing Portable Devices transmit data such as passwords and credit
Against Malicious Use Set Minimum Supported Device card information.
Access
The number of different brands, models, While the Android operating system
and the capabilities of mobile devices has A policy which limits the level of accounts for more than 98% of malicious
grown considerably in the last decade and technology able to access the network will applications out in the wild, iOS can also
poses a challenge to organizations wishing enhance security. As older phones lose pose problems if jailbroken devices are
to secure every device against malicious support for the operating system, hackers brought into the corporate fold. MDMs
use. can exploit gaps in the security which will enforce a protocol that ensures only trusted
never be patched. Removing these devices applications can be installed on mobile
The task is made that much more difficult from the equation limits a hacker’s ability to devices.
when personal devices are created which take advantage of users who continue to use
don’t take into account the tasks they will outdated technology. Enlisting Encryption
be required to perform in an enterprise
environment. Compounding the problem is Coping with Always On Data Keeping information secure is
that most employees will own more than one Access impossible without implementing some
device. form of encryption. Without encryption, a
A mobile workforce with the capability to smartphone connecting to the local fast
Every year there are millions of smart work from anywhere at any time has apparent food public Wi-Fi will open itself up to
devices, misplaced, lost, or stolen and every advantages for improved productivity. snooping attempts, where anyone listening
year the number of devices accessed for Employees can access corporate data from in can hijack the signal and gain access to
their data is growing. Criminals realize that anywhere. In return, this poses challenges to sensitive information.
smart devices they can access may contain the IT department who must now cope with
much more value than their physical cash higher levels of connectivity and security Passwords present one obstacle to
equivalent. holes appearing in social media apps, blogs, accessing a device, but only encryption will
and personal apps. protect data once it is in transit between
The fact that these devices can so easily devices.
fall into the wrong hands necessitates a Lack of awareness paves the way for
BYOD policy which enforces the use of a malicious access. Employees must receive A BYOD has become an essential policy
complicated password beyond a simple PIN. continuing support and education so they for organizations large and small to bring
Newer devices with fingerprint sensors and are always aware of new developments about increases in productivity, but it is
facial recognition remove the inconvenience which may put their corporate accessed critical to remain aware of the risks.
of typing in complicated passwords while data and sensitive personal information at
also keeping a device secure. risk. The developed policies should be
flexible, measurable, and testable so
Securing the Network Protection Against Malicious they can be adapted to a technologically
Apps evolving workplace and continually make
A poorly implemented BYOD policy can improvements to the level of protection.
be a nightmare for IT managers as they Detailed Mobile Device management
software is critical to every organization
50 PayOutMagazine

