Page 50 - Payout Magazine Online Volume 9.3
P. 50

will need to have more stringent security        struggle to keep up with rapidly changing       with a BYOD policy. MDM helps to enforce
protocols applied to them.                       hardware, applications, and network access.     security protocols for every device brought
                                                                                                 into the corporate IT infrastructure and
    Devices which are used internationally will      Network monitoring tools will allow IT      ensures that only authorized devices can
also be required to comply with the security     teams to closely monitor the system and         connect.
laws and regulations in the countries where      keep an eye on the number and types of
they will be operated. As an example, the        devices which are accessing company                 MDM software can also provide the
EU has recently implemented strict privacy       resources as well as the location where they    capability to protect against malicious
policy legislation which could impact a BYOD     are active. With access to these metrics,       applications being downloaded. Many
while the employee is traveling between          an IT team will be able to improve security     malicious apps are designed to gain access
borders.                                         and ensure the infrastructure is capable of     to a device and from there, piggyback onto a
                                                 handling the load.                              corporate server. They can also be used to
Securing Portable      Devices                                                                   transmit data such as passwords and credit
Against Malicious Use                            Set Minimum Supported Device                    card information.
                                                 Access
    The number of different brands, models,                                                          While the Android operating system
and the capabilities of mobile devices has           A policy which limits the level of          accounts for more than 98% of malicious
grown considerably in the last decade and        technology able to access the network will      applications out in the wild, iOS can also
poses a challenge to organizations wishing       enhance security. As older phones lose          pose problems if jailbroken devices are
to secure every device against malicious         support for the operating system, hackers       brought into the corporate fold. MDMs
use.                                             can exploit gaps in the security which will     enforce a protocol that ensures only trusted
                                                 never be patched. Removing these devices        applications can be installed on mobile
    The task is made that much more difficult    from the equation limits a hacker’s ability to  devices.
when personal devices are created which          take advantage of users who continue to use
don’t take into account the tasks they will      outdated technology.                            Enlisting Encryption
be required to perform in an enterprise
environment. Compounding the problem is          Coping with Always On Data                          Keeping information secure is
that most employees will own more than one       Access                                          impossible without implementing some
device.                                                                                          form of encryption. Without encryption, a
                                                     A mobile workforce with the capability to   smartphone connecting to the local fast
    Every year there are millions of smart       work from anywhere at any time has apparent     food public Wi-Fi will open itself up to
devices, misplaced, lost, or stolen and every    advantages for improved productivity.           snooping attempts, where anyone listening
year the number of devices accessed for          Employees can access corporate data from        in can hijack the signal and gain access to
their data is growing. Criminals realize that    anywhere. In return, this poses challenges to   sensitive information.
smart devices they can access may contain        the IT department who must now cope with
much more value than their physical cash         higher levels of connectivity and security          Passwords present one obstacle to
equivalent.                                      holes appearing in social media apps, blogs,    accessing a device, but only encryption will
                                                 and personal apps.                              protect data once it is in transit between
    The fact that these devices can so easily                                                    devices.
fall into the wrong hands necessitates a             Lack of awareness paves the way for
BYOD policy which enforces the use of a          malicious access. Employees must receive            A BYOD has become an essential policy
complicated password beyond a simple PIN.        continuing support and education so they        for organizations large and small to bring
Newer devices with fingerprint sensors and       are always aware of new developments            about increases in productivity, but it is
facial recognition remove the inconvenience      which may put their corporate accessed          critical to remain aware of the risks.
of typing in complicated passwords while         data and sensitive personal information at
also keeping a device secure.                    risk.                                               The developed policies should be
                                                                                                 flexible, measurable, and testable so
Securing the Network                             Protection Against Malicious                    they can be adapted to a technologically
                                                 Apps	                                           evolving workplace and continually make
    A poorly implemented BYOD policy can                                                         improvements to the level of protection.
be a nightmare for IT managers as they               Detailed Mobile Device management
                                                 software is critical to every organization

50 PayOutMagazine
   45   46   47   48   49   50   51   52   53   54   55