Over the past year, businesses have shown a great deal of interest in BYOD (Bring Your Own Device) to work. This has both benefits and drawbacks.
Implementing a BYOD policy improves employee satisfaction and productivity. Using their own mobile device at work allows employees to take information from work home with them and allows them a level of comfort by using a device they are familiar with.
As you may expect, there are security concerns. A survey by LinkedIn’s Information Security group revealed there are many concerns regarding BYOD practices, and the risk of leaking sensitive corporate data with a BYOD program is often too big for most businesses. So, most corporations and organizations have dismissed the idea of BYOD.
There’s also been a lot of discussion about COPE (Corporately-Owned, Personally-Enabled) devices. Many believe COPE will preserve the benefits of BYOD without the inherent security risks. COPE allows corporate policy makers and IT leaders a lot more control over which devices are supported and what controls are implemented on devices even though they are personalized.
With COPE, employees can send personal emails, download photos, and access social media websites. Application controls integrated on the device prevent corporate information from being accessed outside a defined set of boundaries.
COPE also increases the control an IT department has over mobile devices, such as the ability to erase the device if it’s lost or stolen. Yet more control over a device still isn’t enough for many businesses.
Smartphones Are Mini-Computers
Many employees believe their mobile phones aren’t at risk like computers. In reality, mobile devices are essentially pocket-sized computers. While COPE will help to decrease the security concerns on a device at the software level, the most effective way to protect sensitive data is through network-level protection.
According to NQ Mobile, mobile devices have become increasingly vulnerable to ill-intentioned individuals, as they’ve created many new cyber threats that can cause significant damage to a device. Many mobile security breaches have occurred due to malware attacks—exactly the same way a computer gets infected. In many cases, mobile users don’t realize they’ve downloaded harmful malware and, by the time they do, their sensitive data and databases have already been compromised.
Businesses can’t control these security breaches if the employee accepts a message with malware. No software add-on can prevent this. Employees often have trouble identifying a phishing message, which leads them to disclose usernames and passwords that can easily be used to gain unauthorized access to corporate systems.
Stop The Threat At The Source—Your Network
The best way to protect mobile devices used for business purposes is to stop the threat at the initial source—the network. The various anti-virus applications that are available in the iPhone App Store and in the Android Marketplace won’t detect a fraction of the threats, and can be disabled by malware that has gained administrative access to the device. These applications also drain battery life which can slow down the device. Network-based protection is the best bet for employers to detect and prevent the threats that COPE can easily miss.
Many times, a device will get infected with malware when it is off the corporate network. When it is reconnected, it is crucial to identify and diminish any suspicious outbound traffic, before an attacker can acquire any important data.
Mobile threats are more sophisticated than ever and can attack with extraordinary speed. According to FireEye, the average business is struck with a malware attack every three minutes! These attacks can be extremely costly to a company—approximately $3,000 a day to recover.
By protecting the network, IT managers can secure tablets and laptops because at-risk data isn’t limited to mobile smartphones; and neither are threats. The BYOD and COPE movement has become a primary focus, and we need to protect employees who are working remotely using their mobile devices.
Develop a Security Plan For Mobile Devices
While employees are accessing business networks and databases from Wi-Fi networks outside the business place, companies need to keep in mind they’re using unsecure public network access points. Companies should develop a security plan that will protect mobile users who are accessing 3G or 4G networks outside of the workplace. Devices that use the most data, or have the ability to communicate from machine to machine, should be considered high-risk.
Businesses are continually investing in enterprise mobility, but before handing out new devices to your staff or joining the BYOD or COPE movement, consider all of the security risks. Establish a clear security plan using network-based strategies. Account for all of the devices that are connected and ensure your business is prepared for a whole new generation of security risks. COPE won’t address all of the security risks for mobile devices; however, it’s one step closer to a business world where we can easily implement network-level security needs.
Do you have questions or concerns about the safety of your mobile devices? Need help developing a Security Plan for Mobile Devices? Call Infinity Network Solutions today at 478.475.9500 to learn how we can help!