Skip Navigation
Scroll Up

What does Bring Your Own Device (BYOD) Mean for Mobile Security?

When it comes to both our work and private lives, mobile and wireless technology have become an essential part of the landscape. Businesses have to think about what route to take to enable mobility and respond to the needs of partners and employees. But with it comes a whole new wave of mobile security concerns.

Bring Your Own Device (BYOD) has Implications

In many cases, businesses have adopted a Bring Your Own Device (BYOD) approach to mobility. When you consider all the IP-connected devices on your network – Netbooks, tablets, smart phones, laptops, and VOIP phones – there are now two to five more connections per employee.

According to Verizon’s Mobile Security Index 2018, trying to find the right balance of mobile-friendliness has come with its share of challenges.

  •  39% of respondents whose organizations use employee-owned devices ranked them as their #1 security concern. 76% ranked them in the their top three.
  • 79% said that the disruption of systems that mobile creates is an even greater threat than the theft of data. Companies using IoT* that were particularly concerned.
  • Those that knew their organization was sacrificing mobile security for expedience and business performance said they were more than twice as likely to have experienced data loss or downtime.

*Internet of things (IoT) refers to any and all devices that are constantly connected and exchanging data on the network. This can include mobile and computing devices, appliances, vehicles, wearable tech and more.

Downtime and Data Loss are Being Reported

Regarding the potential loss of data, the report also notes that 35% of healthcare organizations have been impacted. Of those, over a third said they had suffered data loss or downtime due to a mobile security incident.

The challenge is that any rogue device connected to your network can give hackers access to many areas of highly sensitive data. An unsecured RJ45 network jack and improperly configured Wireless Access Point (WAP) is as good as leaving a door left unlocked and propped open.

A Good Defense Needs Detection

Any unauthorized device added to the network is considered a rogue device. The goal is to segment and control where a device can be added as well as detecting when one is trying to be added and how it should be approved. Unauthorized Device Monitoring has the capability to do that.

ASP’s Unauthorized Device Monitoring

As part of Wind River’s Advanced Security Package (ASP), you can prevent any employee or outsider from adding equipment to your network that could compromise your systems and steal data. The product dashboard alerts you to any device (or computer) on your local network that is new or not been recognized and needs to be investigated.

Once identified, you can check your internet router and any other routers, hubs or switches to see if any new cables have been plugged in. If the device is something you authorized (such as a new terminal, back-office computer, printer, etc.), you can approve the device and provide a comment describing it for future reference.

If you’d like learn more about how to keep rogue devices from accessing your data, you can get started by reading more about ASP. Existing customers can also contact their Relationship Manager. Mobile security is vital part of maintaining a Security First approach.

Steve Staden

Share This Article
Share on Facebook
Share on Twitter
Share on Linked In