How To Handle A Bring Your Own Device (Byod) In A Business

Size: px
Start display at page:

Download "How To Handle A Bring Your Own Device (Byod) In A Business"

Transcription

1

2 page 2 Consumers soon found that the devices they used in their personal lives could also be used in their professional lives. They could access not only the internet, but their business network as well. They could work during their morning and evening commute. They could work at home. They could work anywhere. Lockdown! It used to be that if you asked a network manager how many computers they had in their environment and how many different configurations, those two numbers would have been the same. Users would naturally try to make themselves as comfortable on their computer as they could. Beyond changing screen appearance and wallpaper, many would install their favorite utilities, applications, and game software. Whenever an IT specialist was called to resolve the ensuing problems with malware or misconfiguration problems they would have to start by exploring that particular user s environment which could add hours to each support call. Network managers began locking down their desktops using a variety of techniques and specialized utilities. Users could still choose their wallpaper and a few other personal items, but they could not install new software, nor access most of their configuration controls. In many cases they could access data, but not save it to removable media. Over time the users became accustomed to working within the confines of the company s network standard configuration, and network managers found support call durations and costs dropping. Then everything changed Consumer devices became more powerful, more sophisticated, and more versatile. Consumers soon found that the devices they used in their personal lives could also be used in their professional lives. They could access not only the internet, but their business network as well. They could work during their morning and evening commute. They could work at home. They could work anywhere. Of course the people they worked for welcomed all of this! Getting more work hours out of employees without even asking for them? Extended access to their people at most any hour of the day or night, any day of the week? This blending of work and home life was an absolute boon for businesses. Not so much for the network managers Back to where we started, and worse Network managers found themselves suddenly back where they started, even worse. Now, not only did they not know what configuration issues they were going to encounter, they didn t even know what devices they were going to have to support. The advantage to the business was just too powerful to resist, but ultimately they knew it would cost the business dearly as malware was inadvertently introduced to the network, data was corrupted or stolen, and user support costs ballooned out of control.

3 page 3 What the Users Want vs. What the Business Needs Especially when using handheld smartphones or other smaller devices users want easy, ready access to everything. They don t want to have to keep re-entering their passwords. The less keyboard entry the better. They want complete visibility of all of their network resources so they can quickly do whatever they need to do. They are accustomed to personal apps that make everything as effortless as possible. The ultimate goal is to put the protection at the point where any device contacts the network, determine if that device is qualified to make access, determine if the user is authorized to make contact, and then carefully control what goes in or out of the network to the user. This, of course, flies in the face of the assurances network managers know they need to provide to their company. Access to the network must be controlled so only authorized users can enter and use resources. Data must be encrypted and protected both at rest in storage and in transit between servers and users, and between users and other users. In this new environment where the same device is used for personal and professional activities, personal data such as music files, photos, s, texts and more must be carefully segregated from corporate data. Otherwise, corporate data ends up exposed and available from potentially hundreds of various devices that may become lost or stolen. A Change in Strategy Requires a Change in Tactics When network managers first figured out long ago that they would have to control their environments more effectively, they focused on the end-user devices; desktops and laptops. They carefully locked them down so users could not change them. They were still able to introduce new software, new upgrades, updates and patches, but users were not able to introduce anything. That strategy obviously cannot be applied in the age of BYOD when the devices aren t even owned by the company. The solution many IT providers have found focuses instead on the core of the network and controlling access there. The ultimate goal is to put the protection at the point where any device contacts the network, determine if that device is qualified to make access, determine if the user is authorized to make contact, and then carefully control what goes in or out of the network to the user. This white paper discusses the controls companies need to implement both on the administrative side with carefully enforced policies that users must follow, and also by putting the right technical controls in place to assure agile user access without compromising security. What You Need to Consider Before you Begin a BYOD (Bring Your Own Device) Initiative in Your Company The earliest computing environments consisted of a centralized head-end where all compute processing and storage actually took place with a distributed group of terminals allowing users to access the central system, or mainframe. This was often called a time-sharing environment because mainframe access was measured by the time actually spent using it.

4 page 4 In the late 1970 s and early 1980 s this model shifted to distributed processing and storage with the introduction of the microcomputer which brought the entire compute assembly to each desktop. It didn t take long, however, until the value of centralization reasserted itself. Since computer communications bandwidth was relatively slow, many products were introduced that would allow personal computers to access a centralized server that ran the actual applications and only communicated screen appearance and keystrokes between server and user. Today, we call this approach VDI, or virtual desktop interface. Many network managers have turned to VDI over the years as their strategy for controlling users desktops. Since each user s complete desktop experience is actually stored on the server, they can access it from basically any device they choose and the entire profile cannot be altered from anywhere except the server itself. Remember that the data assets that are at stake here are the most valuable assets your company owns and build your policy accordingly. As it becomes impractical, if not impossible to control the end user devices that are accessing the network, centralization reasserts itself as the ideal model from which to establish all the controls necessary to allow users to access the network from whichever device they choose. This does not mean that nothing needs to be done at the user end, but it does enable a strategy that can allow users the ready access they want while properly protecting the company s network and high-value data assets. BYOD Policy Remember that besides controlling the technology in use, you also have to provide controls for the people involved, which is a much trickier proposition. Unlike devices, people are unpredictable and often inconsistent. Your BYOD policy must be explicit, detailed, comprehensive, and clear about consequences. Remember that the data assets that are at stake here are the most valuable assets your company owns and build your policy accordingly. Issues and concerns to be sure are addressed in your BYOD Policy include: Permitted Data Access Even though you may know that your people are aware of what data entities they are and aren t permitted to access it is important to state them in your policy in case you are ever called upon to litigate against anyone who violated your rules. They may, for example, claim that their unauthorized access was unintentional. Given that you will be enforcing those rules electronically, any unauthorized access will require intent to compromise your security provisions.

5 page 5 Personal Responsibility for Data Protection It is critical that your people understand and appreciate their own participation and responsibility for the protection of your company s data. As an example, a user may easily defeat the lock on their own smart phone or tablet and then leave it where others can access or steal it. Similarly users may leave their laptop logged in and unattended. It must be emphasized that users must take every precaution. If your employee chooses to consume inappropriate content, that s their business and their right. However, when the device they do that on connects to your network it becomes your business. Expectation of Privacy When most people send an , they aren t thinking about the privacy of the information they re sending. They are therefore surprised when an executive from their company asks to speak with them about an intercepted . If that discussion leads to embarrassment or termination they may decide to sue for wrongful termination. If they have confirmed receipt of a policy which states that they cannot have a reasonable expectation of privacy because is a corporate asset they have no legal grounds to sue. In cases where there is no such policy in place the damages paid have been in the millions. Employee BYOD Exit Strategy When developing your BYOD policy it is crucial to make decisions about what will happen when an employee leaves the company. If there are any corporate apps or data on their device you will want to remove them, and so you may request that they submit their device to you for that removal. But what if they refuse? You may be able to perform a remote wipe of the device if they leave it on and accessible to you long enough for you to do that, but then you are also destroying their data assets, including personal photographs and purchased apps. If you ve backed those up and can return them to them you shouldn t have much trouble, otherwise they may pursue you for damages. If you can t perform the remote wipe you may have to litigate to compel them to destroy your property located on their device. This can become very difficult and very complex. Regulatory Compliance Issues Regulatory compliance usually has implications far beyond the technology. Users must understand their roles and responsibilities in maintaining compliance with whatever regulations your business is subject to. A simple example is the deletion of an . This may be completely against your company s retention policy. Unless your system prevents users from completely deleting any from the server you may be held responsible for being unable to produce required documentation in an ediscovery. Make sure your users understand what is required of them.

6 page 6 While you clearly will be supporting your corporate apps, exercise care when announcing your BYOD support strategy. You d like to be able to say that you will support all apps on all devices, but this is likely to be impractical. Does the company have the right to access personal data while supporting Suppose one of your users submits their personal smartphone or tablet for repair or upgrading by your IT department. While performing the required service your technicians inadvertently find evidence of illegal activity on the part of the user. What is your responsibility to report this? Are you even allowed to report this? Obviously only your attorney can properly answer these questions, but including this in your statement that the user cannot have a reasonable expectation of privacy can help protect you. Integration of BYOD Policy with Acceptable Use Policy If your employee chooses to consume inappropriate content, that s their business and their right. However, when the device they do that on connects to your network it becomes your business. If, for example, an employee downloads prurient photographs and then s them where your employees can see them you may be held liable. Even if the intended recipient does not find the material objectionable, if another employee passing their cubicle sees it, you may still be held liable. BYOD Issues on the Client Device Side Approved Devices While the goal is to provide any user access with any device, this may not be practical from a support or security standpoint. If you know there are devices that cannot be properly managed to safely access your network, forbid them in your policy as well as in your network access control technology. Similarly you ll need to state what levels of support your users can expect from you vs. their own provider. You may, for example, limit your support to devices on major platforms like Android, ios, and Windows Phone. Approved Applications One of the technical issues that must be wrestled with is whether or not you can achieve containerization of personal data and apps separate from corporate data and apps. Especially if this is NOT the case in your environment yet you must be very clear about forbidden apps. Some are capable of downloading malware from the internet and uploading it from your users to device to your network. Constant diligence must be exercised in finding these apps and notifying your users. Who Owns the Device and its voice and data services In a BYOD strategy, it is anticipated that the employee owns their own device and the bandwidth contract that enables it. Some companies may elect to reimburse the employee for part or all of the recurring monthly expense as a perk, others may not.

7 page 7 Who s Going to Support the Device Personal Apps as well as Professional While you clearly will be supporting your corporate apps, exercise care when announcing your BYOD support strategy. You d like to be able to say that you will support all apps on all devices, but this is likely to be impractical. With the plethora of apps constantly coming out, and new devices introduced regularly, anyone would be hard pressed to support them all. You must consider your support budget, your support staff, and reasonable expectations of turnaround time. You must also consider that your employee s device may also be used by their family, in which case damage can be caused at any time. Again some separation of personal from professional use is best when determining how each device will be supported When a user attempts to connect to your network they must authenticate themselves to confirm that they are qualified to make access. The same must be true for the device they are using to make that connection. Authentication & Authorization Required Access Security Measures to Use the Device When a user picks up their smartphone or their tablet their expectation is that they will quickly and easily be able to start using it. A keycode or gesture-based lock should not pose a problem. Imposing two-factor authentication, such as a SecureID token, just to use the device may be seen as overkill. If all corporate apps and data reside on your servers, this may not be an issue. Simply require the second factor when logging into the network. Users may still balk, but you have to balance their ease of use against corporate security. Remote Wipe or Bricking When a device such as a smartphone or tablet is lost or stolen the cost of the device is negligible compared to the cost of corporate data on the device. The usual solution is to remotely wipe out all content on the device, a process often referred to as bricking the device because it basically turns it into a completely unintelligent brick. In a BYOD environment it is important to remember that you will be wiping out all personal data on your employee s device too. While you may not be legally responsible for their content, it will contribute highly to employee morale when you can restore their personal content to their replacement device as well as corporate apps and data. Remember also that remote wipe can be easily defeated by disconnecting the device from the network, so employees should know to contact your IT department first the moment they discover a lost or stolen device.

8 page 8 Data Containerization vs. Virtual Desktop Usually a user runs an application on their device which accesses data from your network. That data is transferred to their device during use. A virtual desktop (VDI) interface on your user s device allows them to connect to your network but the application is actually running on a network server. The user sees the screen and can send keystrokes and mouse movements, but no application other than the VDI is running on their device and no data is transferred from the server to the device. This completely isolates the user device from the network resources creating a very distinct separation between the two. Since no corporate data resides on the user device there is far less exposure for the company. Many IT professionals have been working on methodologies to containerize private data and corporate data separately on the device to keep them from intermingling, which will also create that separation, but still allows corporate assets to remain on the user s device which creates greater exposure. While it is always best practice to provide solid protection from a respected provider, it becomes even more critical when each user device becomes a potential conduit of disaster to your network. Encryption Each user device must be able to support the company s data encryption strategy. If a device cannot encrypt and de-crypt data sent to and received by your network it cannot be accepted as a BYOD candidate. BYOD Issues on the Centralized Server Side Network Access Control When a user attempts to connect to your network they must authenticate themselves to confirm that they are qualified to make access. The same must be true for the device they are using to make that connection. Network Access Control interrogates the device to determine if it can support the necessary protocols, has required anti-malware measures in place and functioning properly, and is configured properly to access the network. This is a critical system to have in place to prevent damage to your network. Application Delivery The goal is to provide a consistently excellent user experience. Users accessing the network from their own device want to work at the same speed and with the same facility as if they were in the office sitting at their desk. Wireless access, however, doesn t always provide enough bandwidth to accomplish this. Especially when working with smartphones and tablets many have chosen VDI, virtual desktop interface, to minimize the amount of data actually travelling between the user and the network. VDI only transmits screen appearance, keystrokes, and mouse movements. No large amount of data crosses the network. Since there is less data transfer the responsiveness of the device to the user is much faster. This also keeps corporate data at the server and not on the user s device where it is more vulnerable.

9 page 9 Malware Protection No computing device is exempt from being attacked by viruses, Trojans, worms and other malware. While it is always best practice to provide solid protection from a respected provider, it becomes even more critical when each user device becomes a potential conduit of disaster to your network. Providing protection both at the device level and at points where the device connects into the corporate network is crucial. Providing protection both at the device level and at points where the device connects into the corporate network is crucial. Data Encryption at Rest and in Transit Many think that encryption of data is something you do when transferring it from one place to another, and this is certainly an important security provision. Protecting data at rest in storage is also important. Malicious individuals can easily work to access or corrupt data in storage. Also, the government can subpoena data from storage providers without informing you. By using an encryption strategy where the keys are not available to the provider, the government must make you aware of the subpoena to obtain your encryption keys. From a user-device standpoint, every device accessing your network will have to be able to support your encryption strategy. DLP Data Loss Prevention If your network doesn t include provisions for monitoring and enforcing rules around proper data use, your BYOD initiative should absolutely motivate the addition of it. Data Loss Prevention provides visibility into who is using what data entities for what purpose and enables you to quickly act to prevent potential compromises.

10 WHAT TO CONSIDER BEFORE YOU TELL USERS THEY CAN BYOD page 10

How To Understand The Bring Your Own Device To School Policy At A School

How To Understand The Bring Your Own Device To School Policy At A School The Thomas Hardye School Bring Your Own Device to School (BYOD) Policy for Students Adopted by Personnel & Resources Committee 1 st September 2014 Review date: 31 st August 2015 Signed by Chair:. CONTENTS

More information

Mobile Devices: Know the RISKS. Take the STEPS. PROTECT AND SECURE Health Information.

Mobile Devices: Know the RISKS. Take the STEPS. PROTECT AND SECURE Health Information. Mobile Devices: Know the RISKS. Take the STEPS. PROTECT AND SECURE Health Information. Mobile Devices: Risks to Health Information Risks vary based on the mobile device and its use. Some risks include:

More information

Mobile Devices: Know the RISKS. Take the STEPS. PROTECT AND SECURE Health Information.

Mobile Devices: Know the RISKS. Take the STEPS. PROTECT AND SECURE Health Information. Mobile Devices: Know the RISKS. Take the STEPS. PROTECT AND SECURE Health Information. Mobile Devices: Risks to to Health Mobile Information Devices: Risks to Health Information Risks vary based on the

More information

Practical Legal Aspects of BYOD

Practical Legal Aspects of BYOD Practical Legal Aspects of BYOD SESSION ID: LAW-F01 Lawrence Dietz General Counsel & Managing Director TalGlobal Corporation ldietz@talglobal.net +1 408 993 1300 http://psyopregiment.blogspot.com Francoise

More information

National Cyber Security Month 2015: Daily Security Awareness Tips

National Cyber Security Month 2015: Daily Security Awareness Tips National Cyber Security Month 2015: Daily Security Awareness Tips October 1 New Threats Are Constantly Being Developed. Protect Your Home Computer and Personal Devices by Automatically Installing OS Updates.

More information

BYOD Guidelines A practical guide for implementing a successful BYOD Management program in an organization of any size.

BYOD Guidelines A practical guide for implementing a successful BYOD Management program in an organization of any size. April 2014 BYOD Guidelines A practical guide for implementing a successful BYOD Management program in an organization of any size. Bring your own device (BYOD) refers to the policy of permitting employees

More information

Kaspersky Security for Mobile

Kaspersky Security for Mobile Kaspersky Security for Mobile See. Control. Protect. MOVING TARGETS Mobile devices play a key role in connectivity and productivity. But they also introduce new risks to the business: in the past 12 months

More information

BYOD Policy for [AGENCY]

BYOD Policy for [AGENCY] BYOD Policy for [AGENCY] This document provides policies, standards, and rules of behavior for the use of smartphones, tablets and/or other devices ( Device ) owned by [AGENCY] employees personally (herein

More information

Sample Employee Agreement for Business Use of Employee-Owned Personal Computing Devices (Including Wearables 1 )

Sample Employee Agreement for Business Use of Employee-Owned Personal Computing Devices (Including Wearables 1 ) Sample Employee Agreement for Business Use of Employee-Owned Personal Computing Devices (Including Wearables 1 ) Overview: The Bring Your Own Device (BYOD) program allows employees to use their own computing

More information

Why Email Encryption is Essential to the Safety of Your Business

Why Email Encryption is Essential to the Safety of Your Business Why Email Encryption is Essential to the Safety of Your Business What We ll Cover Email is Like a Postcard o The Cost of Unsecured Email 5 Steps to Implement Email Encryption o Know Your Compliance Regulations

More information

BYOD BEST PRACTICES GUIDE

BYOD BEST PRACTICES GUIDE BYOD BEST PRACTICES GUIDE 866.926.8746 1 www.xantrion.com TABLE OF CONTENTS 1 Changing Expectations about BYOD... 3 2 Mitigating the Risks... 4 2.1 Establish Clear Policies and Expectations... 4 2.2 Create

More information

Neoscope www.neoscopeit.com 888.810.9077

Neoscope www.neoscopeit.com 888.810.9077 Your law firm depends on intelligence. But can you count on your technology? You may not be in the intelligence technology business, but it s probably impossible to imagine your practice without IT. Today,

More information

Guidelines for smart phones, tablets and other mobile devices

Guidelines for smart phones, tablets and other mobile devices Guidelines for smart phones, tablets and other mobile devices Summary Smart phones, tablets and other similar mobile devices are being used increasingly both privately and in organisations. Another emerging

More information

Bring Your Own Device (BYOD) and Mobile Device Management. tekniqueit.com

Bring Your Own Device (BYOD) and Mobile Device Management. tekniqueit.com Bring Your Own Device (BYOD) and Mobile Device Management tekniqueit.com Bring Your Own Device (BYOD) and Mobile Device Management People are starting to expect the ability to connect to public networks

More information

Security and Privacy Considerations for BYOD

Security and Privacy Considerations for BYOD Security and Privacy Considerations for BYOD Carol Woodbury, President SkyView Partners, Inc 1 Introduction The world of BYOD (Bring Your Own Device) is rapidly expanding. You may not think it s happening

More information

{ipad Security} for K-12. Understanding & Mitigating Risk. plantemoran.com

{ipad Security} for K-12. Understanding & Mitigating Risk. plantemoran.com {ipad Security} plantemoran.com for K-12 Understanding & Mitigating Risk Plante Moran The ipad is in K-12. Since its debut in April 2010, the ipad has quickly become the most popular tablet, outselling

More information

Bring Your Own Device (BYOD) and Mobile Device Management. www.cognoscape.com

Bring Your Own Device (BYOD) and Mobile Device Management. www.cognoscape.com Bring Your Own Device (BYOD) and Mobile Device Management www.cognoscape.com Bring Your Own Device (BYOD) and Mobile Device Management People are starting to expect the ability to connect to public networks

More information

BRING YOUR OWN DEVICE (BYOD) AND MOBILE DEVICE MANAGEMENT

BRING YOUR OWN DEVICE (BYOD) AND MOBILE DEVICE MANAGEMENT BRING YOUR OWN DEVICE (BYOD) AND MOBILE DEVICE MANAGEMENT www.intivix.com (415) 543 1033 HELP TEAM MEMBERS TO COLLABORATE MORE EASILY FROM ANYWHERE. People are starting to expect the ability to connect

More information

Use Bring-Your-Own-Device Programs Securely

Use Bring-Your-Own-Device Programs Securely Use Bring-Your-Own-Device Programs Securely By Dale Gonzalez December 2012 Bring-your-own-device (BYOD) programs, which allow employees to use their personal smartphones, tablets and laptops in and out

More information

HIPAA Security Alert

HIPAA Security Alert Shipman & Goodwin LLP HIPAA Security Alert July 2008 EXECUTIVE GUIDANCE HIPAA SECURITY COMPLIANCE How would your organization s senior management respond to CMS or OIG inquiries about health information

More information

SBA Cybersecurity for Small Businesses. 1.1 Introduction. 1.2 Course Objectives. 1.3 Course Topics

SBA Cybersecurity for Small Businesses. 1.1 Introduction. 1.2 Course Objectives. 1.3 Course Topics SBA Cybersecurity for Small Businesses 1.1 Introduction Welcome to SBA s online training course: Cybersecurity for Small Businesses. SBA s Office of Entrepreneurship Education provides this self-paced

More information

HIPAA SECURITY RISK ASSESSMENT SMALL PHYSICIAN PRACTICE

HIPAA SECURITY RISK ASSESSMENT SMALL PHYSICIAN PRACTICE HIPAA SECURITY RISK ASSESSMENT SMALL PHYSICIAN PRACTICE How to Use this Assessment The following risk assessment provides you with a series of questions to help you prioritize the development and implementation

More information

There are two new acronyms affecting most businesses today. And, like all change, these can have both positive and negative impacts on your business.

There are two new acronyms affecting most businesses today. And, like all change, these can have both positive and negative impacts on your business. There are two new acronyms affecting most businesses today. And, like all change, these can have both positive and negative impacts on your business. We put this document together to help you understand

More information

What Do You Mean My Cloud Data Isn t Secure?

What Do You Mean My Cloud Data Isn t Secure? Kaseya White Paper What Do You Mean My Cloud Data Isn t Secure? Understanding Your Level of Data Protection www.kaseya.com As today s businesses transition more critical applications to the cloud, there

More information

OWA vs. MDM. Once important area to consider is the impact on security and compliance policies by users bringing their own devices (BYOD) to work.

OWA vs. MDM. Once important area to consider is the impact on security and compliance policies by users bringing their own devices (BYOD) to work. OWA vs. MDM Introduction SmartPhones and tablet devices are becoming a common fixture in the corporate environment. As feature phones are replaced with new devices such as iphone s, ipad s, and Android

More information

Hands on, field experiences with BYOD. BYOD Seminar

Hands on, field experiences with BYOD. BYOD Seminar Hands on, field experiences with BYOD. BYOD Seminar Brussel, 25 september 2012 Agenda Challenges RIsks Strategy Before We Begin Thom Schiltmans Deloitte Risk Services Security & Privacy Amstelveen tschiltmans@deloitte.nl

More information

Mapping Your Path to the Cloud. A Guide to Getting your Dental Practice Set to Transition to Cloud-Based Practice Management Software.

Mapping Your Path to the Cloud. A Guide to Getting your Dental Practice Set to Transition to Cloud-Based Practice Management Software. Mapping Your Path to the Cloud A Guide to Getting your Dental Practice Set to Transition to Cloud-Based Practice Management Software. Table of Contents Why the Cloud? Mapping Your Path to the Cloud...4

More information

EMBRACING THE AGE OF MOBILITY

EMBRACING THE AGE OF MOBILITY Embracing The Age Of Mobility & The Byod Workplace buzz-worthy acronym or a workplace trend that will eventually fade; it s part of the complete restructuring of the conventional way we ve worked up to

More information

BRING YOUR OWN DEVICE. Protecting yourself when employees use their own devices for business

BRING YOUR OWN DEVICE. Protecting yourself when employees use their own devices for business BRING YOUR OWN DEVICE Protecting yourself when employees use their own devices for business Bring Your Own Device: The new approach to employee mobility In business today, the value put on the timeliness

More information

Information Security It s Everyone s Responsibility

Information Security It s Everyone s Responsibility Information Security It s Everyone s Responsibility Developed By The University of Texas at Dallas (ISO) Purpose of Training As an employee, you are often the first line of defense protecting valuable

More information

HIPAA: Protecting Your. Ericka L. Adler. Practice and Your Patients

HIPAA: Protecting Your. Ericka L. Adler. Practice and Your Patients HIPAA: Protecting Your Ericka L. Adler Practice and Your Patients Rachel V. Rose Fallout from the Omnibus Rule Compliance strategies for medical practices 1. Know / manage your business associates and

More information

BYOD. opos WHAT IS YOUR POLICY? SUMMARY

BYOD. opos WHAT IS YOUR POLICY? SUMMARY BYOD WHAT IS YOUR POLICY? opos SUMMARY The organization s employees and contractors frequently perform employment-related tasks which require connecting to the organization s networks, systems, and/or

More information

10 Hidden IT Risks That Might Threaten Your Business

10 Hidden IT Risks That Might Threaten Your Business (Plus 1 Fast Way to Find Them) Your business depends on intelligence. But can you count on your technology? You may not be in the intelligence technology business, but it s probably impossible to imagine

More information

WHITE PAPER. Mobile Security. Top Five Security Threats for the Mobile Enterprise and How to Address Them

WHITE PAPER. Mobile Security. Top Five Security Threats for the Mobile Enterprise and How to Address Them Mobile Security Top Five Security Threats for the Mobile Enterprise and How to Address Them Today s countless mobile devices present tangible opportunities to drive measurable and substantial value for

More information

Supporting Workforce Mobility: Best Practices in Enterprise Mobility Management

Supporting Workforce Mobility: Best Practices in Enterprise Mobility Management Best Practices in Enterprise Mobility Management An ENTERPRISE MANAGEMENT ASSOCIATES (EMA ) White Paper Prepared for FrontRange October 2013 IT & DATA MANAGEMENT RESEARCH, INDUSTRY ANALYSIS & CONSULTING

More information

Enterprise Mobility & BYOD: Four Biggest Challenges And How to Solve Them WHITE PAPER

Enterprise Mobility & BYOD: Four Biggest Challenges And How to Solve Them WHITE PAPER Enterprise Mobility & BYOD: Four Biggest Challenges And How to Solve Them WHITE PAPER WHITE PAPER 2 Enterprise Mobility & BYOD: Four Biggest Challenges And How to Solve Them Business success is highly

More information

Virtual Desktop.. Infrastructure Goes Mobile..

Virtual Desktop.. Infrastructure Goes Mobile.. White paper Virtual Desktop.. Infrastructure Goes Mobile.. VDI gives agencies a reliable option for addressing BYOD challenges. Executive Summary The ubiquity of mobile devices is no longer surprising.

More information

Appendix 4-2: Sample HIPAA Security Risk Assessment For a Small Physician Practice

Appendix 4-2: Sample HIPAA Security Risk Assessment For a Small Physician Practice Appendix 4-2: Administrative, Physical, and Technical Safeguards Breach Notification Rule How Use this Assessment The following sample risk assessment provides you with a series of sample questions help

More information

Mobile Medical Devices and BYOD: Latest Legal Threat for Providers

Mobile Medical Devices and BYOD: Latest Legal Threat for Providers Presenting a live 90-minute webinar with interactive Q&A Mobile Medical Devices and BYOD: Latest Legal Threat for Providers Developing a Comprehensive Usage Strategy to Safeguard Health Information and

More information

CHECK POINT THE MYTHS OF MOBILE SECURITY

CHECK POINT THE MYTHS OF MOBILE SECURITY CHECK POINT THE MYTHS OF MOBILE SECURITY Mobility has transformed the workplace. Laptops, smartphones and tablets not only enable an organization s road warriors, but also create freedoms for all employees

More information

Yes MAM: How Mobile Device Management Plus Mobile Application Management Protects and Addresses BYOD

Yes MAM: How Mobile Device Management Plus Mobile Application Management Protects and Addresses BYOD STRATEGY ANALYTICS INSIGHT October 2012 Yes MAM: How Mobile Device Management Plus Mobile Application Management Protects and Addresses BYOD By Mark Levitt, Analyst/Director at Strategy Analytics BYOD

More information

HIPAA: Bigger and More Annoying

HIPAA: Bigger and More Annoying HIPAA: Bigger and More Annoying Instructor: Laney Kay, JD Contact information: 4640 Hunting Hound Lane Marietta, GA 30062 (770) 312-6257 (770) 998-9204 (fax) laney@laneykay.com www.laneykay.com OFFICIAL

More information

The Truth About Enterprise Mobile Security Products

The Truth About Enterprise Mobile Security Products The Truth About Enterprise Mobile Security Products Presented by Jack Madden at TechTarget Information Security Decisions 2013 Welcome to my enterprise mobile security product session! Instead of printing

More information

Information Security It s Everyone s Responsibility

Information Security It s Everyone s Responsibility Information Security It s Everyone s Responsibility The University of Texas at Dallas Information Security Office (ISO) Purpose of Training Information generated, used, and/or owned by UTD has value. Because

More information

Say Yes to BYOD How Fortinet Enables You to Protect Your Network from the Risk of Mobile Devices WHITE PAPER

Say Yes to BYOD How Fortinet Enables You to Protect Your Network from the Risk of Mobile Devices WHITE PAPER Say Yes to BYOD How Fortinet Enables You to Protect Your Network from the Risk of Mobile Devices WHITE PAPER FORTINET Say Yes to BYOD PAGE 2 Introduction Bring Your Own Device (BYOD) and consumerization

More information

Bring Your Own Device (BYOD) and Mobile Device Management

Bring Your Own Device (BYOD) and Mobile Device Management Bring Your Own Device (BYOD) and Mobile Device Management Intivix.com (415) 543 1033 PROFESSIONAL IT SERVICES FOR BUSINESSES OF ALL SHAPES AND SIZES People are starting to expect the ability to connect

More information

Mobile Security: Top Five Security Threats for the Mobile Enterprise and How to Address Them

Mobile Security: Top Five Security Threats for the Mobile Enterprise and How to Address Them Mobile Security: Top Five Security Threats for the Mobile Enterprise and How to Address Them Today s countless mobile devices present tangible opportunities to drive measurable and substantial value for

More information

10 Hidden IT Risks That Might Threaten Your Law Firm

10 Hidden IT Risks That Might Threaten Your Law Firm (Plus 1 Fast Way to Find Them) Your law firm depends on intelligence. But can you count on your technology? You may not be in the intelligence technology business, but it s probably impossible to imagine

More information

Mobile Device Strategy

Mobile Device Strategy Mobile Device Strategy Technology Experience Bulletin, TEB: 2012-01 Mobile Device Strategy Two years ago, the Administrative Office of Pennsylvania Courts (AOPC) standard mobile phone was the Blackberry.

More information

Policy for Staff and Post 16 Student BYOD (Bring Your Own Device)

Policy for Staff and Post 16 Student BYOD (Bring Your Own Device) Policy for Staff and Post 16 Student BYOD (Bring Your Own Device) Date approved: 7 th May 2015 Review Schedule: Annual Reviewed: Next review: 1 Context Aims of this Policy Definitions CONTENTS 1. OVERVIEW...

More information

Data Management Policies. Sage ERP Online

Data Management Policies. Sage ERP Online Sage ERP Online Sage ERP Online Table of Contents 1.0 Server Backup and Restore Policy... 3 1.1 Objectives... 3 1.2 Scope... 3 1.3 Responsibilities... 3 1.4 Policy... 4 1.5 Policy Violation... 5 1.6 Communication...

More information

Online Banking Terms and Conditions and Privacy Policy

Online Banking Terms and Conditions and Privacy Policy Online Banking Terms and Conditions and Privacy Policy These terms and conditions are our agreement with you for Online Banking and our Mobile Banking App they tell you how our Online Banking and our Mobile

More information

Cloud Backup and Recovery for Endpoint Devices

Cloud Backup and Recovery for Endpoint Devices Cloud Backup and Recovery for Endpoint Devices Executive Summary Armed with their own devices and faster wireless speeds, your employees are looking to access corporate data on the move. They are creating,

More information

HELPFUL TIPS: MOBILE DEVICE SECURITY

HELPFUL TIPS: MOBILE DEVICE SECURITY HELPFUL TIPS: MOBILE DEVICE SECURITY Privacy tips for Public Bodies/Trustees using mobile devices This document is intended to provide general advice to organizations on how to protect personal information

More information

Avoid the Top 5 Epic Fails of Enterprise Endpoint Backup

Avoid the Top 5 Epic Fails of Enterprise Endpoint Backup White Paper Avoid the Top 5 Epic Fails of Enterprise Endpoint Backup Costly Mistakes Expose Corporate Data to Unnecessary Risk Executive Summary Traditional backup protected information stored on servers

More information

Supplier Information Security Addendum for GE Restricted Data

Supplier Information Security Addendum for GE Restricted Data Supplier Information Security Addendum for GE Restricted Data This Supplier Information Security Addendum lists the security controls that GE Suppliers are required to adopt when accessing, processing,

More information

Securing Corporate Email on Personal Mobile Devices

Securing Corporate Email on Personal Mobile Devices Securing Corporate Email on Personal Mobile Devices Table of Contents The Impact of Personal Mobile Devices on Corporate Security... 3 Introducing LetMobile Secure Mobile Email... 3 Solution Architecture...

More information

51 JS-R STUDENT USE OF INFORMATION TECHNOLOGY RESOURCES

51 JS-R STUDENT USE OF INFORMATION TECHNOLOGY RESOURCES Page 1 of 5 Purpose This regulation implements Board policy JS by setting forth specific procedures, requirements and restrictions and conditions governing student use of District Information Technology

More information

BEST PRACTICES IN BYOD

BEST PRACTICES IN BYOD 1 BEST PRACTICES IN BYOD Addressing BYOD Challenges in the Enterprise Whitepaper 2 Best Practices in BYOD Bring Your Own Device (BYOD) offers many potential advantages: enhanced productivity, increased

More information

Defense Media Activity Guide To Keeping Your Social Media Accounts Secure

Defense Media Activity Guide To Keeping Your Social Media Accounts Secure Guide To Keeping Your Social Media Accounts Secure Social media is an integral part of the strategic communications and public affairs missions of the Department of Defense. Like any asset, it is something

More information

16 Common Backup Problems & Mistakes

16 Common Backup Problems & Mistakes 16 Common Backup Problems & Mistakes 1. Tape errors, Tape Drive failures. Probably the number one backup problem is simply caused by the unreliability of tape. Tape drives have a higher failure rate than

More information

SOLUTION BRIEF Enterprise Mobility Management. Critical Elements of an Enterprise Mobility Management Suite

SOLUTION BRIEF Enterprise Mobility Management. Critical Elements of an Enterprise Mobility Management Suite SOLUTION BRIEF Enterprise Mobility Management Critical Elements of an Enterprise Mobility Management Suite CA Technologies is unique in delivering Enterprise Mobility Management: the integration of the

More information

Real World Considerations for Implementing Desktop Virtualization

Real World Considerations for Implementing Desktop Virtualization Real World Considerations for Implementing Desktop Virtualization The Essentials Series sponsored by Intro duction to Desktop Virtualization for the IT Pro... 1 What Is Desktop Virtualization?... 2 VDI

More information

White Paper. The Principles of Tokenless Two-Factor Authentication

White Paper. The Principles of Tokenless Two-Factor Authentication White Paper The Principles of Tokenless Two-Factor Authentication Table of contents Instroduction... 2 What is two-factor authentification?... 2 Access by hardware token... 3 Advantages and disadvantages

More information

EXECUTIVE SUMMARY Cloud Backup for Endpoint Devices

EXECUTIVE SUMMARY Cloud Backup for Endpoint Devices EXECUTIVE SUMMARY Cloud Backup for Endpoint Devices According to Gartner, by 2015 more than 60% of enterprises will have suffered material loss of sensitive corporate data via mobile devices. Armed with

More information

Data Loss Prevention Whitepaper. When Mobile Device Management Isn t Enough. Your Device Here. Good supports hundreds of devices.

Data Loss Prevention Whitepaper. When Mobile Device Management Isn t Enough. Your Device Here. Good supports hundreds of devices. Data Loss Prevention Whitepaper When Mobile Device Management Isn t Enough Your Device Here. Good supports hundreds of devices. Contents Shifting Security Landscapes 3 Security Challenges to Enterprise

More information

Technical Standards for Information Security Measures for the Central Government Computer Systems

Technical Standards for Information Security Measures for the Central Government Computer Systems Technical Standards for Information Security Measures for the Central Government Computer Systems April 21, 2011 Established by the Information Security Policy Council Table of Contents Chapter 2.1 General...

More information

Bring Your Own Device Mobile Security

Bring Your Own Device Mobile Security Abstract Energized by the capability of consumer mobile devices employees demanded them in the workplace. Information technology organizations had neither the time nor budget to satisfy employee demands.

More information

High Speed Internet - User Guide. Welcome to. your world.

High Speed Internet - User Guide. Welcome to. your world. High Speed Internet - User Guide Welcome to your world. 1 Welcome to your world :) Thank you for choosing Cogeco High Speed Internet. Welcome to your new High Speed Internet service. When it comes to a

More information

BYOD & the Implications for IT:

BYOD & the Implications for IT: BYOD & the Implications for IT: How to Support BYOD without Putting Your Company at Risk NEC Corporation of America www.necam.com Table of Contents Executive Summary... 3 The Onslaught of BYOD: Why Now?...

More information

Running Head: AWARENESS OF BYOD SECURITY CONCERNS 1. Awareness of BYOD Security Concerns. Benjamin Tillett-Wakeley. East Carolina University

Running Head: AWARENESS OF BYOD SECURITY CONCERNS 1. Awareness of BYOD Security Concerns. Benjamin Tillett-Wakeley. East Carolina University Running Head: AWARENESS OF BYOD SECURITY CONCERNS 1 Awareness of BYOD Security Concerns Benjamin Tillett-Wakeley East Carolina University AWARENESS OF BYOD SECURITY CONCERNS 2 Abstract This paper will

More information

Setting BYOD Policy: A New Partnership for IT and HR

Setting BYOD Policy: A New Partnership for IT and HR Introduction As the line between office and home life continues to blur, employees increasingly rely on their own smartphones, tablets, and laptop computers for work-related tasks. Today, more than 70

More information

CHOOSING AN MDM PLATFORM

CHOOSING AN MDM PLATFORM CHOOSING AN MDM PLATFORM Where to Start the Conversation Whitepaper 2 Choosing an MDM Platform: Where to Start the Conversation There are dozens of MDM options on the market, each claiming to do more than

More information

HIPAA Security. 2 Security Standards: Administrative Safeguards. Security Topics

HIPAA Security. 2 Security Standards: Administrative Safeguards. Security Topics HIPAA Security SERIES Security Topics 1. Security 101 for Covered Entities 5. 2. Security Standards - Organizational, Security Policies Standards & Procedures, - Administrative and Documentation Safeguards

More information

BYOD Policies: A Litigation Perspective

BYOD Policies: A Litigation Perspective General Counsel Panel Reveals the Real Deal BYOD Policies: A Litigation Perspective By Andrew Hinkes Reprinted with Permission BYOD Policies: A Litigation Perspective By Andrew Hinkes Bring-your-own-device

More information

Codes of Connection for Devices Connected to Newcastle University ICT Network

Codes of Connection for Devices Connected to Newcastle University ICT Network Code of Connection (CoCo) for Devices Connected to the University s Author Information Security Officer (Technical) Version V1.1 Date 23 April 2015 Introduction This Code of Connection (CoCo) establishes

More information

White Paper. Data Security. The Top Threat Facing Enterprises Today

White Paper. Data Security. The Top Threat Facing Enterprises Today White Paper Data Security The Top Threat Facing Enterprises Today CONTENTS Introduction Vulnerabilities of Mobile Devices Alarming State of Mobile Insecurity Security Best Practices What if a Device is

More information

IN CAMERA. Issues and Questions. Installation of Employee Monitoring Software on District Computers. Report to Mayor and Council

IN CAMERA. Issues and Questions. Installation of Employee Monitoring Software on District Computers. Report to Mayor and Council IN CAMERA Report to Mayor and Council Issues and Questions Installation of Employee Monitoring Software on District Computers Prepared by: Andy Laidlaw Chief Administrative Officer June 15, 2015 Issues

More information

Choose Your Own Device (CYOD) and Mobile Device Management. gsolutionz.com

Choose Your Own Device (CYOD) and Mobile Device Management. gsolutionz.com Choose Your Own Device (CYOD) and Mobile Device Management gsolutionz.com Choose Your Own Device (CYOD) and Mobile Device Management 2 gsolutionz.com People are starting to expect the ability to connect

More information

Learn to protect yourself from Identity Theft. First National Bank can help.

Learn to protect yourself from Identity Theft. First National Bank can help. Learn to protect yourself from Identity Theft. First National Bank can help. Your identity is one of the most valuable things you own. It s important to keep your identity from being stolen by someone

More information

How Technology Executives are Managing the Shift to BYOD

How Technology Executives are Managing the Shift to BYOD A UBM TECHWEB WHITE PAPER SEPTEMBER 2012 How Technology Executives are Managing the Shift to BYOD An analysis of the benefits and hurdles of enabling employees to use their own consumer devices in the

More information

10 BEST PRACTICES FOR MOBILE DEVICE MANAGEMENT (MDM)

10 BEST PRACTICES FOR MOBILE DEVICE MANAGEMENT (MDM) 10 BEST PRACTICES FOR MOBILE DEVICE MANAGEMENT (MDM) CONTENT INTRODUCTION 2 SCOPE OF BEST PRACTICES 2 1. HAVE A POLICY THAT IS REALISTIC 3 2. TAKE STOCK USING A MULTIPLATFORM REPORTING AND INVENTORY TOOL...3

More information

Setting BYOD Policy: A New Partnership for IT and HR

Setting BYOD Policy: A New Partnership for IT and HR Introduction As the line between office and home life continues to blur, employees increasingly rely on their own smartphones, tablets, and laptop computers for work-related tasks. Today, more than 70

More information

Dispatch: A Unique Email Security Solution

Dispatch: A Unique Email Security Solution Dispatch: A Unique Email Security Solution 720 836 1222 sales / support sales@absio.com email www.absio.com web 8740 Lucent Boulevard, Ste 101 Highlands Ranch, CO, 80129 1 110-WP005-1 Organizations use

More information

MOBILE SECURITY: DON T FENCE ME IN

MOBILE SECURITY: DON T FENCE ME IN MOBILE SECURITY: DON T FENCE ME IN Apart from the known and the unknown, what else is there? 18 Harold Pinter, Nobel Prize-winning playwright, screenwriter, director, actor 32 INTRODUCTION AND METHODOLOGY

More information

"Bring Your Own Device" Brings its Own Challenges

Bring Your Own Device Brings its Own Challenges 6 June 2012 "Bring Your Own Device" Brings its Own Challenges By Susan McLean and Alistair Maughan The consumerisation of IT is the growing trend for information technology to emerge first in the consumer

More information

Remote Access Securing Your Employees Out of the Office

Remote Access Securing Your Employees Out of the Office Remote Access Securing Your Employees Out of the Office HSTE-NB0011-RV 1.0 Hypersecu Information Systems, Inc. #200-6191 Westminster Hwy Richmond BC V7C 4V4 Canada 1 (855) 497-3700 www.hypersecu.com Introduction

More information

Choosing an MDM Platform

Choosing an MDM Platform Whitepaper Choosing an MDM Platform Where to Start the Conversation 2 Choosing an MDM Platform: Where to Start the Conversation There are dozens of MDM options on the market, each claiming to do more than

More information

Consumerization. Managing the BYOD trend successfully. Harish Krishnan, General Manager, Wipro Mobility Solutions WWW.WIPRO.COM

Consumerization. Managing the BYOD trend successfully. Harish Krishnan, General Manager, Wipro Mobility Solutions WWW.WIPRO.COM Consumerization Managing the BYOD trend successfully WWW.WIPRO.COM Harish Krishnan, General Manager, Wipro Mobility Solutions Employees dictate IT Enterprises across the world are giving in to the Consumerization

More information

Proactive Credential Monitoring as a Method of Fraud Prevention and Risk Mitigation. By Marc Ostryniec, vice president, CSID

Proactive Credential Monitoring as a Method of Fraud Prevention and Risk Mitigation. By Marc Ostryniec, vice president, CSID Proactive Credential Monitoring as a Method of Fraud Prevention and Risk Mitigation By Marc Ostryniec, vice president, CSID The increase in volume, severity, publicity and fallout of recent data breaches

More information

Mobile Device Security

Mobile Device Security Mobile Device Security Through no fault of your own, your company has become 2-3x more exposed to data breaches and loss. How? Through mobile devices. The same tools that are enhancing the way your employees

More information

Say Yes to BOYD How Fortinet Enables You to Protect Your Network from the Risk of Mobile Devices

Say Yes to BOYD How Fortinet Enables You to Protect Your Network from the Risk of Mobile Devices Say Yes to BOYD How Fortinet Enables You to Protect Your Network from the Risk of Mobile Devices Introduction Bring Your Own Device (BYOD) and consumerization of IT are all phrases that serve to encompass

More information

Internet threats: steps to security for your small business

Internet threats: steps to security for your small business Internet threats: 7 steps to security for your small business Proactive solutions for small businesses A restaurant offers free WiFi to its patrons. The controller of an accounting firm receives a confidential

More information

A Guide to MAM and Planning for BYOD Security in the Enterprise

A Guide to MAM and Planning for BYOD Security in the Enterprise A Guide to MAM and Planning for BYOD Bring your own device (BYOD) can pose a couple different challenges, not only the issue of dealing with security threats, but also how to handle mobile applications.

More information

Security, privacy, and incident response issues are often

Security, privacy, and incident response issues are often ISSA DEVELOPING AND CONNECTING CYBERSECURITY LEADERS GLOBALLY The Legal Implications of BYOD: Preparing Personal Device Use Policies By David Navetta, Esq. ISSA member, Denver, USA Chapter This article

More information

Protecting Content and Securing the Organization Through Smarter Endpoint Choices

Protecting Content and Securing the Organization Through Smarter Endpoint Choices Protecting Content and Securing the Organization Through Smarter Endpoint Choices Prepared by Dan O Farrell Dell Cloud Client-Computing Finally a practical approach to protecting content and securing desktops

More information

BUSINESS COMPUTER SECURITY. aaa BUSINESS SECURITY SECURITY FOR LIFE

BUSINESS COMPUTER SECURITY. aaa BUSINESS SECURITY SECURITY FOR LIFE aaa BUSINESS SECURITY SECURITY FOR LIFE CHAPTER 1: WHY COMPUTER SECURITY IS IMPORTANT FOR YOUR BUSINESS No matter how big or small your business is, it s highly likely that you have some information stored

More information

Healthcare Buyers Guide: Mobile Device Management

Healthcare Buyers Guide: Mobile Device Management Healthcare Buyers Guide: Mobile Device Management Physicians and other healthcare providers see value in using mobile devices on the job. BYOD is a great opportunity to provide better and more efficient

More information

Trust Digital Best Practices

Trust Digital Best Practices > ARMING IT AGAINST SMARTPHONE THREATS Trust Digital Best Practices April 2009 The information contained herein is subject to change at any time, and Trust Digital makes no warranties, either express or

More information

ADDING STRONGER AUTHENTICATION for VPN Access Control

ADDING STRONGER AUTHENTICATION for VPN Access Control ADDING STRONGER AUTHENTICATION for VPN Access Control Adding Stronger Authentication for VPN Access Control 1 ADDING STRONGER AUTHENTICATION for VPN Access Control A VIRTUAL PRIVATE NETWORK (VPN) allows

More information