Enterprise Mobility Challenge #3: Maximizing Security

The last two blog posts (part 1: Defining Company-Specific Best Practices, and part 2: Supporting Employees on Multiple Endpoints) discussed how to define mobility best practices and policies, and how to support employees on multiple endpoints.  This post, the third in our four-part series, covers how you can maximize your security to reduce your overall risk.

BYOD poses many security risks, but certain steps can be taken to alleviate them.

Inevitably, devices will be lost or stolen. Because of this, it’s important that you have defined your policies for replacement or compensation, as well as your security protocol for protecting stolen data.

One best practice is to ensure that you have the ability to remotely wipe all mobile devices used by employees, ensuring that sensitive data doesn’t fall into the wrong hands. Backup and restore capabilities can also help reduce the risk of lost data, and device location services can help locate a lost device without having to involve IT.

Employee-owned devices may sometimes bypass inbound corporate filters, leaving them vulnerable to malware. Adding security layers to mobile devices can help prevent this, but you should anticipate resistance from your users. As always, be sure to consider legal privacy requirements before instituting security policies for personal devices. 

For more information about the four biggest Enterprise Mobility challenges and how to resolve them, register for the complete whitepaper