
Introduction
Security experts tend to toss about the advice: Don’t mix work and personal business, devices or information!
What does that mean? More simply put, separate your data to protect your ALL of your information. If a hacker compromises your workplace, your personal files remain safe. If someone sabotages your home WiFi, then confidential professional data stays secure.
Typically, that means using separate devices at work and home, too. According to recent data, however, around 82% of organizations have a “Bring Your Own Device” policy that complicates the separation.
What Does Your AUP Say About BYOD?
So how can you achieve a secure balance between work and personal data when your office has a BYOD policy in place? First, it’s important to know what guidelines your company has in place regarding its own BYOD policy. This information is likely outlined in the Acceptable Use Policy.
An Acceptable Use Policy defines what can and cannot be done on company-owned devices and on the company network. Since the rules encompass your particular workplace, each company will have a unique AUP!
Some common elements of an AUP regarding personal devices at work include…
- specifications about what devices are acceptable, including operating systems requirements, trusted antivirus software, and other security features.
- restrictions on accessing certain types of data or using specific applications.
- encryption requirements, strong passwords and password managers, and regular updates.
- policies about how company data should be handled, stored, and transmitted to ensure confidentiality and compliance with local and industry-specific data protection regulations.
- any potential device monitoring and methods of enforcing company policies.
- details on any financial support the company provides for device purchase, maintenance, or data plans.
- incident response procedures for mobile attacks, including procedures for reporting and handling lost or stolen devices.
Alas, what if your company has a less robust AUP? What if you simply want to safeguard your personal data even more?
Protecting Your BYOD Devices
Many data breaches involve personal devices, especially the ones used for both work and home projects. Human error doesn’t account for every breach, although it heavily contributes. Many breaches still stem from factors like improper device management and lapses in security awareness. (PSST! That’s one reason that blogs like these are so important! The more you know, the lower your chances of falling for a cyber-scam.)
So what can YOU do to safeguard your personal devices on a day-to-day basis, especially if you use it at work?
- Ask your company about their Mobile Device Management solution. MDM allows IT to enforce security policies, manage device features, and remotely wipe data if your device is lost or stolen.
- Network segmentation separates important data into different, encrypted areas of the network to keep the rest safe if one is infiltrated. This also helps prevent cross-contamination of information!
- Always use strong, unique passwords for your device and enable encryption to protect sensitive data. Make them at least 12 characters and made up of numbers, letters and symbols. Use a password manager to store them securely!
- Regularly update your operating system and apps. Turn on auto-dates to remain safe against newly discovered threats and vulnerabilities!
- Use a Virtual Private Network when accessing company data over public WiFi to ensure your connection is secure.
- Implement Data Loss Prevention tools to prevent unintentional transfer of sensitive information outside the corporate network. DLP should part of the Acceptable Use Policy, too!
- Ensure that only devices meeting your company’s security standards can access network resources. Establish security access levels so that people can only access the data necessary to complete their roles.
By following these practices, you’ll better protect both your personal and work data while complying with your company’s BYOD policy!
Conclusion
Navigating a Bring Your Own Device policy while keeping your work and personal data safe can be challenging, but it’s definitely manageable with the right practices.
The fate of our private data is everyone’s business. Especially when your workplace implements a BYOD policy, your professional data’s safety hinges on the security of your and your coworkers’ personal devices. Mixing work and personal systems can be dangerous, but not if you take extra steps toward good, segmented security!
Understanding and practicing your company’s Acceptable Use Policy for all workplace technology, including personal devices you bring in; and following best practices for protecting your mobile systems will better protect ALL of your data, every day.
The post Bring Your Own Device Means Bringing Extra Security appeared first on .