How to allow ‘Bring your own device’ at work – without compromising security.

laptop

The proliferation of smartphones and tablets in the consumer market has fueled the rising trend of businesses embracing ‘Bring Your Own Device’ (BYOD) in the workplace. At the same time, it can create a significant cybersecurity risk for businesses that aren’t adequately prepared.

In a survey we conducted among 2,000 UK employees about their cybersecurity behaviors and experiences, we found that one in five have been directly involved in a security breach or loss of sensitive data. The results also show that 91% of the employees who have been involved in a security incident use personal devices to access sensitive systems and data while at work.

An instinctive response from many business owners to reduce the risk would be to prohibit the use of personal devices entirely. However, a third (34%) of the employees surveyed said that the ability to BYOD is a principal consideration when choosing a job.

So, rather than swimming against the tide of employee expectations, it makes sense for employers to find a way to make BYOD work. They can capitalize on the benefits it offers, such as increased productivity and greater employee satisfaction while implementing cybersecurity policies and encouraging the right behaviors to mitigate the risks involved.

Not only did the Covid-19 pandemic accelerate the work-from-home culture, but in many cases it made it necessary for employees to access company networks from their personal devices. Therefore, for organizations who do not have a formal BYOD policy yet, there has never been a better time to implement one – and here are my five key tips.

1. Get stakeholder buy-in

Jumping straightaway to policy creation is often met with resistance. The first step, therefore, is to gain both stakeholder and employee buy-in.

Senior business leaders need assurances that the benefits of BYOD outweigh the possible security risks and require proof of a concrete plan and support for the implementation of a BYOD policy. IT leaders in particular need to be aware of and agree on the level of resource and support that will be committed to BYOD security. Stakeholders can provide diverse perspectives from various departments and interests within the organization. Functions like HR, Finance, IT operations, and the security team should form part of a BYOD project management team to contribute to policy development.

In addition to these stakeholders, employee input is critical for creating an effective BYOD policy. Creating a policy framework with only the business’ interests at heart may result in backlash. Equally, excessively restrictive policies or failing to offer support for the right devices will possibly lead to lower employee engagement and productivity.

2. Develop a clear policy for BYOD

In our research survey, 42% of respondents indicated that their organization does not enforce a security policy to control how personal devices can interact with sensitive information. Yet, this is perhaps the most critical aspect of managing BYOD security challenges. Security policies can be rather complex and detailed, so it’s essential to have a simplified version that’s easy to communicate to employees. The policy should cover key elements such as whether employees can use their personal devices at work or use them for work. The most substantial security risks are associated with the latter.

Although due diligence is necessary in all cases, the policy should also clarify the permitted device types and mandated cybersecurity tools to use in tandem with the devices. The same applies to business applications – include a clear list of approved programs and forbid the use of unapproved programs. Furthermore, it’s important to specify the extent to which employees can request IT support for personal devices.

3. Improve employee cybersecurity awareness

Our survey revealed that nearly a quarter (24%) of employees lack confidence in recognizing cybersecurity threats at work. And since human error is one of the biggest BYOD risks, regular mandatory cybersecurity awareness training must be at the heart of any security policy. This will help employees recognize common threats such as phishing emails and suspicious links. Knowledge of these threats is critical in a constantly evolving landscape.

Awareness must also become part of the working culture. Share best practices on the security elements employees are constantly exposed to, like password protection and usage. Make cybersecurity training part of the onboarding process for new employees, including how to use any necessary tools.

4. Ensure access to critical cybersecurity tools

Our research exposed a startling lack of ready access to critical cyber security tools. Only around half (or less) of employees have access to crucial tools such as multi-factor authentication (45%), web filtering (47%), laptop encryption software (50%), and virtual private networks (52%).

It’s no good simply making these tools available since not everyone is naturally tech-savvy. The business needs to implement a strategy to ensure employees actually adopt and use them. They’re no longer the exclusive domain of IT security specialists. All employees must be well-educated in how to correctly use cybersecurity tools if the organization wishes to steer clear of risk.

5. Monitor and review regularly

Although this point may seem obvious, it’s one of the most important. Remember that most cybersecurity processes are not based on a ‘set it and forget it’ approach. Businesses need to constantly track their effectiveness and make regular updates and improvements – especially as the cybercriminals never stand still.

Ab Initio partners with BT Group to deliver big data

Luke Conrad • 24th October 2022

AI is becoming an increasingly important element of the digital transformation of many businesses. As well as introducing new opportunities, it also poses a number of challenges for IT teams and the data teams supporting them. Ab Initio has announced a partnership with BT Group to implement its big data management solutions on BT’s internal...

WAICF – Dive into AI visiting one of the most...

Delia Salinas • 10th March 2022

Every year Cannes held an international technological event called World Artificial Intelligence Cannes Festival, better known by its acronym WAICF. One of the most luxurious cities around the world, located on the French Riviera and host of the annual Cannes Film Festival, Midem, and Cannes Lions International Festival of Creativity. 

Bouncing back from a natural disaster with resilience

Amber Donovan-Stevens • 16th December 2021

In the last decade, we’ve seen some of the most extreme weather events since records began, all driven by our human impact on the plant. Businesses are rapidly trying to implement new green policies to do their part, but climate change has also forced businesses to adapt and redefine their disaster recovery approach. Curtis Preston,...
The Digital Transformation Expo is coming to London on October 2-3. Register now!