BYOD Bring Your Own Device Personal Devices in a Corporate World

Size: px
Start display at page:

Download "BYOD Bring Your Own Device Personal Devices in a Corporate World"

Transcription

1 A Member of OneBeacon Insurance Group BYOD Bring Your Own Device Personal Devices in a Corporate World Author: Elizabeth Marazzo, Risk Control Specialist Published: July 2014 Executive Summary What, Why and How? Bring Your Own Device or BYOD is quickly becoming a workplace technology trend Essentially, BYOD is the policy of allowing employees to bring their personally owned devices such as smartphones, laptops and tablets to work and using these devices to access private company information, systems and applications Wait, hold on; what happened to the fear of virus intrusions because of the apps sitting on your mobile device or fear from unsecured devices? Yes, times are changing and today, this practice is not only okay, but it s gaining traction and introducing a new set of risks Although the term BYOD was not fully recognized until 2011, its origins can be traced to 2009 at Intel, when it recognized an increasing number of employees bringing their own devices to work and connecting them to the corporate network 1 There is a lot of talk suggesting BYOD will be the next big shift in corporate computing And yet there is a lot of confusion about potential implications for the IT department How would data security be managed? Would IT be tasked with supporting every conceivable computing device? How would they keep track of personal devices and would this overtax the IT group? On the other side of the spectrum, organizations see this as an opportunity to increase employee productivity on devices they love, while reducing the company s mobile expenses Many organizations are implementing a BYOD policy with varying approaches and varying results Some companies with BYOD models require employees to cover all costs (purchase, monthly fees, etc), while others may partially reimburse employees Businesses that embrace a BYOD policy are seeing a reduction in their mobile expenses as mobile device costs become the employee s responsibility Organizations in the technology space are more likely to adopt a liberal BYOD strategy while those in healthcare, government, security and finance may take a conservative approach It is predicted that by 2017 half of the world s companies will implement BYOD programs and will no longer provide computing devices to employees, according to a recent Gartner report The report also predicted that about 15% of companies will never move to BYOD and about 40% will offer employees the choice of BYOD or company-provided devices 2 Research conducted by HDI in November 2013 indicated an increase in the implementation of BYOD programs for both tablets and mobile phones It also noted that organizations have implemented improved mobile device management systems with well-defined polices, and are better able to keep up with the pace of mobile device innovation This evidence reinforces overall industry maturing in support of mobile devices 3 1

2 Benefits Why has this phenomena gained traction? First and foremost are the personal and productivity benefits BYOD is fueled by users who expect total flexibility in managing their professional and personal business wherever they are, on their device of choice 4 Employee Satisfaction - Employees love their own devices and prefer to use them Furthermore, the familiarity with their device is likely to increase the employee s motivation and productivity levels One Device vs Two - For an employee, the BYOD process eliminates the need to carry both a corporate and personal mobile device, making day-to-day activities more manageable However, some employees may prefer to have strict boundaries between work and personal matters and are likely to maintain multiple devices Companies see a great benefit from this single-device approach as employees are always available Since their personal device is typically nearby, they are likely to respond more quickly to customer and corporate requests such as s, texts and social media feeds Cutting- Edge Devices - Since BYOD devices are personal resources, they tend to be more cutting edge, so the company gains the benefit of the latest features and capabilities, without having to pay for these upgrades Employees also tend to upgrade their personal devices to the latest hardware more frequently than most organizations Risks Unfortunately, not all that glitters is gold A recent survey by InformationWeek yielded some startling statistics regarding BYOD matters: 5 7% of BYOD environments do not have password-based access control, simply relying on the company s BYOD policy Only 53% require password lengths greater than four characters for primary access on the mobile devices 2

3 42% do not scan personal devices for malware 45% have had a mobile device where enterprise data came up missing in the past year 13% do not require encryption on devices containing enterprise data 28% stated they were not subject to data protection regulations (eg, SOX, HIPAA, PCI and State-based), even though they likely were 68% support BYOD but only 39% currently have a mobile device management or MDM solution There are several risks and challenges that must be addressed before an organization implements BYOD Data Security - security on the device may be compromised from infected data, attachments or apps, which can possibly lead to infections or attacks on the rest of the corporate network With the increased use of smartphones, cybercrime has also gone up 6 Some of the data on the phone could seriously compromise the company s security if that information fell into the wrong hands Passwords stored inappropriately on the mobile device, or a device with weak password could give a hacker or criminal direct access to the company s corporate systems e-discovery - This refers to an employer s legal obligation to access and present critical data in the event of pending litigation The data may reside on either the corporate or personal device Attempting to access its corporate data on an employee s personal device may result in additional legal obstacles due to the employee s privacy rights A recent federal case Lazette v Kulmatycki, (June 5, 2013 in the northern district of Ohio), the US District court denied a motion to dismiss the plaintiff s complaint for invasion of privacy In this case, the former employee, who was allowed to use the company-issued mobile device for personal , alleged that after her employment ended her supervisor accessed 48,000 messages and shared some personal information with third parties The court found that a company s search of private employee data on a mobile device violated the Stored Communications Act because such a search was unauthorized even though in this case, the device was owned by the company 7 BYOD presents four primary challenges for e-discovery 8 : Access and control of data and the device since the company does not own or physically control the devices There are multiple categories of data to consider, such as personal and corporate, which are stored in the same environment Data may reside in various locations and it is possible that critical corporate data exists solely on the personal device The employer may find it difficult to safeguard and retrieve the data from personal devices Personal Injury - What if an employee files for a claim such as repetitive motion associated with using their own mobile device; is this compensable? There have already been a few such cases where employees have filed a claim that resulted from the use of their personal devices 9 In a regular work environment, employers can manage their cost and risk through workplace safety training, providing ergonomically designed equipment, etc But what if the employee gets BlackBerry thumbs from their own device? Can they take action against their employer? Who is responsible? How much of this stems from personal versus corporate use of the same device? Data Corruption and Deletion - BYOD devices can include laptops, netbooks and ultrabooks in addition to smartphones and tablets These devices need to be updated to meet company s network security requirements, such as software patches and revisions Imagine if the employee is working on an important personal project the great American novel and it ends up being 3

4 deleted or becomes inaccessible due to a company required software update or patch Can the employee take legal actions against his employer for this information loss? What recourse does the employee have, if any? Device Sharing - An employee could be sharing the device with someone else, such as a spouse or child Due to multiple users, they could inadvertently violate corporate policies or procedures regarding apps or sites that can be loaded, used and viewed on the device They may also establish insecure but easy to remember passwords on the device This could result in potential issues, including corporate data loss or security breaches There is also a potential for third-party legal liability against the company if there is loss of data that is owned by the spouse or person sharing the employee s device An example would be a spouse who used the personal device to photograph an important one-time life event The company, in the course of routine device management, deletes the photos, which are the only copies How does the company protect itself against claims from the third-party since the company does not have any policy or contract with that individual? Revoked or Lost Devices - What happens when an employee sells or recycles a device after an upgrade, or their device is stolen or lost? Or what if an employee is terminated or leaves the company? The mobile device contains company information but employees clearly retain their own personal device Unless the company has a policy in place, this presents potential data breach exposures Compensation Issues - The BYOD program makes it easier for employees to work outside of normal working hours thus presenting some issues under the Fair Labor Standards Act (FLSA) FLSA requires employers to pay non-exempt employees at least minimum wage for all compensable time worked, and to further pay these employees overtime pay for hours worked in excess of 40 hours a week Generally, compensable time includes work performed for an employer such as responding to s, time spent on tablets, smartphones and laptops to complete a project, etc This may constitute compensable time for FLSA purposes which, if not paid, can lead to liability Employers who allow non-exempt employees to participate in the BYOD program can minimize this risk by incorporating timekeeping policies in their BYOD program to limit and capture time spent outside of the office or normal business hours and state that employees are expected to report all time worked 10 Is BYOD the way to go for your company? Adopting BYOD is a company-specific decision that must align with the balance of the corporate culture and practices Some organizations may thrive while others may see it is as a detriment A survey conducted by Logicalis concluded that employees in high-growth markets are not only willing but embrace the possibility of having constant access to work data and applications even when outside of normal business hours These employees demonstrate a willingness to do whatever it takes and work whatever hours are required in order to advance their careers To date, BYOD adoption is most common in companies with revenues between $500 million and $5 billion, but with geographic differences, according to Gartner The highest rate of adoption is in India, China and Brazil, with US adopting at twice the European level 11 If you are thinking of implementing BYOD, here are some questions you need to consider Is mobile access a must? What are the goals and benefits of BYOD? (Improved productivity? Better business processes?) Which group of your workforce needs mobile access? Which data or systems will employees need to access via BYOD? 4

5 What sensitivities are there around these systems and data? Are there any other benefits BYOD can offer for your organization? Have you done a full risk assessment including assessing the legal issues? Will BYOD require the company to establish new HR policies? BYOD Management If your organization decides to implement BYOD, risks will need to be managed effectively, including employee privacy Adoption requires striking a balance between the company s right to monitor, access, review, data-wipe, and disclose company information and the employee s expectation of privacy and safeguarding of personal data Historically, devices resided within the corporate network and were trustworthy Now with personal mobile devices and an ever-increasing number of malware and hackers, security and management concerns are at the top on the list How can we trust and ensure that these mobile devices will behave within the corporate network? Luckily we can counter these risks Mobile Security Expert Designate a specialist who educates users on social and behavioral security risks, sets appropriate use policy and helps develop strategies for mobile security and risk mitigation, mobile data protection, mobile OS platform review and, mobile application threat management 12 BYOD Policy & Procedures - Document and publicize a BYOD policy According to a recent study, 571% of full-time employees partake in some form of BYOD, but only 20% have been asked to read and acknowledge a BYOD policy Another study found that 78% of firms that moved to BYOD do not have a policy at all 13 Without a policy in place, organizations cannot exercise control over the fine line between corporate and personal use, and adequately protect both parties Remember, BYOD policies are somewhat complex and require collaboration between HR, Legal and IT functions Access Control Consider the use of strong and robust passwords to access and log on to both the device and the network The security system should clearly establish the identity of the user and device accessing the network, with a defined policy governing access levels and data that can be accessed and saved or transferred Lastly, the system should be able to maintain logs on who accessed the system, when they logged on and the type of data that was viewed and transferred Malware and Antivirus - There are some effective technologies available to protect corporate data and keep malware off the company network Anti-malware software is available and should be installed on personal devices to protect them against the very latest viruses, Trojans, spyware, worms, bots and other malicious code Other types of software will also include anti-spam technologies to filter unwanted calls and texts on the mobile device Another feature to consider is anti-phishing tools and policies to help prevent inadvertent visits to fraudulent websites that may try to steal information Geofencing - Some companies have also put into place geofencing, which creates a virtual perimeter or boundary that will let employees use and/or play games but just not during company time This can also prevent employees from downloading high definition videos on their tablets that could clog up the company network MDM or Mobile Device Management With the variety of personal devices available, it may not be practical to manage these through internal IT Consider software tools to manage mobile devices through a variety of vendors such as Airwatch, MobileIron, Citrix, Good Technology, IBM and others These companies provide services and solutions that will help facilitate controlling these risks These companies can deploy security agents onto each device; implement security policies 5

6 on the devices, separate personal and corporate data and also enable selective wiping of corporate data without deleting the employee s data They can also enable encryption on the devices, as well as protect data when a device is lost or stolen Encryption is an excellent method for ensuring that any information or data stored on a mobile device is useless to thieves Conclusion Regardless of whether you are already taking advantage of the BYOD trend or you re simply thinking about it, make sure that you are fully aware of the risks and that you thoughtfully address any potential issues Security, risk management, remediation and policy development should be considered before setting up a BYOD program Once implemented, be certain to communicate the new policy and enforce available risk mitigation steps This up-front investment will ensure that mobile expense savings can be fully realized along with a productive, appreciative workforce This thoroughness will enable making BYOD a competitive advantage Contact Us To learn more about how OneBeacon Technology Insurance can help you manage online and other technology risks, please contact Lloyd Takata, EVP of OneBeacon Technology Insurance at ltakata@onebeacontechcom or References 1 Mobile: Learn from Intel s CISO on securing employee-owned devices Accessed April Kanaracus, Chris (May 1, 2013) Half of companies will require BYOD by 2017, Gartner Says IDG News Service Accessed April gartner-sayshtml 3 HDI Research Brief, Mobile Device Support and BYOD: Where Are We Now? Written by Jenny Rains, Senior Research Analyst 4 The ultimate guide to BYOD Mobile Iron, Access April BYOD%5B5%5Dpdf?mkt_tok=3RkMMJWWfF9wsRovuK%2FNZKXonjHpfsX86%2BssUaWg 38431UFwdcjKPmjr1YQCT8N0aPyQAgobGp5I5FEITrnYU6lot6IJXg%3D%3D, page 3 5 Cohodas, Marilyn (February 3, 2014) Infographic: Mobile security run amok InformationWeek: DarkReading Accessed April Gilmore, Georgina & Beardmore, Peter (2013) Mobile security and BYOD for dummies Accessed April 2014 Page 15 & 16 s/august2013/21-byod-dummiespdf 7 BYOD: balancing employee privacy concerns against employer security needs 8 Watson, Steve (June ) Successful ediscovery in a BYOD environment Intel Whitepaper Accessed April

7 9 Casey, Kevin (November 19, 2012) 6 risks your BYOD policy must address InformationWeek Accessed April risks-your-byod-policy-must-address/d/d-id/ ? Ibid 2 12 Ibid 4, page 9 13 Gabriel, Chris (January 21, 2013) No BYOD policy, time to grasp the nettle CxUnplugged Accessed April

Bring Your Own Device (BYOD) and Mobile Device Management. tekniqueit.com

Bring Your Own Device (BYOD) and Mobile Device Management. tekniqueit.com Bring Your Own Device (BYOD) and Mobile Device Management tekniqueit.com Bring Your Own Device (BYOD) and Mobile Device Management People are starting to expect the ability to connect to public networks

More information

Bring Your Own Device (BYOD) and Mobile Device Management. www.cognoscape.com

Bring Your Own Device (BYOD) and Mobile Device Management. www.cognoscape.com Bring Your Own Device (BYOD) and Mobile Device Management www.cognoscape.com Bring Your Own Device (BYOD) and Mobile Device Management People are starting to expect the ability to connect to public networks

More information

Guideline on Safe BYOD Management

Guideline on Safe BYOD Management CMSGu2014-01 Mauritian Computer Emergency Response Team CERT-MU SECURITY GUIDELINE 2011-02 Enhancing Cyber Security in Mauritius Guideline on Safe BYOD Management National Computer Board Mauritius Version

More information

White Paper. Data Security. The Top Threat Facing Enterprises Today

White Paper. Data Security. The Top Threat Facing Enterprises Today White Paper Data Security The Top Threat Facing Enterprises Today CONTENTS Introduction Vulnerabilities of Mobile Devices Alarming State of Mobile Insecurity Security Best Practices What if a Device is

More information

Sample Employee Agreement for Business Use of Employee-Owned Personal Computing Devices (Including Wearables 1 )

Sample Employee Agreement for Business Use of Employee-Owned Personal Computing Devices (Including Wearables 1 ) Sample Employee Agreement for Business Use of Employee-Owned Personal Computing Devices (Including Wearables 1 ) Overview: The Bring Your Own Device (BYOD) program allows employees to use their own computing

More information

Creating a Bulletproof BYOD (Bring Your Own Device) Policy for Personal Devices At Work

Creating a Bulletproof BYOD (Bring Your Own Device) Policy for Personal Devices At Work Creating a Bulletproof BYOD (Bring Your Own Device) Policy for Personal Devices At Work FEATURED FACULTY: Amy F. Melican, Associate, Proskauer 212.969.3641 AMelican@proskauer.com Traci Clements, Attorney,

More information

Securing mobile devices in the business environment

Securing mobile devices in the business environment IBM Global Technology Services Thought Leadership White Paper October 2011 Securing mobile devices in the business environment By I-Lung Kao, Global Strategist, IBM Security Services 2 Securing mobile

More information

Say Yes to BYOD How Fortinet Enables You to Protect Your Network from the Risk of Mobile Devices WHITE PAPER

Say Yes to BYOD How Fortinet Enables You to Protect Your Network from the Risk of Mobile Devices WHITE PAPER Say Yes to BYOD How Fortinet Enables You to Protect Your Network from the Risk of Mobile Devices WHITE PAPER FORTINET Say Yes to BYOD PAGE 2 Introduction Bring Your Own Device (BYOD) and consumerization

More information

Cyber Security. John Leek Chief Strategist

Cyber Security. John Leek Chief Strategist Cyber Security John Leek Chief Strategist AGENDA The Changing Business Landscape Acknowledge cybersecurity as an enterprise-wide risk management issue not just an IT issue How to develop a cybersecurity

More information

Bring Your Own Device (BYOD) and Mobile Device Management

Bring Your Own Device (BYOD) and Mobile Device Management Bring Your Own Device (BYOD) and Mobile Device Management Intivix.com (415) 543 1033 PROFESSIONAL IT SERVICES FOR BUSINESSES OF ALL SHAPES AND SIZES People are starting to expect the ability to connect

More information

BRING YOUR OWN DEVICE (BYOD) AND MOBILE DEVICE MANAGEMENT

BRING YOUR OWN DEVICE (BYOD) AND MOBILE DEVICE MANAGEMENT BRING YOUR OWN DEVICE (BYOD) AND MOBILE DEVICE MANAGEMENT www.intivix.com (415) 543 1033 HELP TEAM MEMBERS TO COLLABORATE MORE EASILY FROM ANYWHERE. People are starting to expect the ability to connect

More information

How To Understand The Bring Your Own Device To School Policy At A School

How To Understand The Bring Your Own Device To School Policy At A School The Thomas Hardye School Bring Your Own Device to School (BYOD) Policy for Students Adopted by Personnel & Resources Committee 1 st September 2014 Review date: 31 st August 2015 Signed by Chair:. CONTENTS

More information

Internet threats: steps to security for your small business

Internet threats: steps to security for your small business Internet threats: 7 steps to security for your small business Proactive solutions for small businesses A restaurant offers free WiFi to its patrons. The controller of an accounting firm receives a confidential

More information

Say Yes to BOYD How Fortinet Enables You to Protect Your Network from the Risk of Mobile Devices

Say Yes to BOYD How Fortinet Enables You to Protect Your Network from the Risk of Mobile Devices Say Yes to BOYD How Fortinet Enables You to Protect Your Network from the Risk of Mobile Devices Introduction Bring Your Own Device (BYOD) and consumerization of IT are all phrases that serve to encompass

More information

A Guide to MAM and Planning for BYOD Security in the Enterprise

A Guide to MAM and Planning for BYOD Security in the Enterprise A Guide to MAM and Planning for BYOD Bring your own device (BYOD) can pose a couple different challenges, not only the issue of dealing with security threats, but also how to handle mobile applications.

More information

Acronis 2002-2014 BRING YOUR OWN DEVICE

Acronis 2002-2014 BRING YOUR OWN DEVICE Acronis 2002-2014 BRING YOUR OWN DEVICE Introduction With over a billion smartphones and tablets at arms length, a majority of your global workforce already possesses the technology needed to better connect

More information

Practical Legal Aspects of BYOD

Practical Legal Aspects of BYOD Practical Legal Aspects of BYOD SESSION ID: LAW-F01 Lawrence Dietz General Counsel & Managing Director TalGlobal Corporation ldietz@talglobal.net +1 408 993 1300 http://psyopregiment.blogspot.com Francoise

More information

{ipad Security} for K-12. Understanding & Mitigating Risk. plantemoran.com

{ipad Security} for K-12. Understanding & Mitigating Risk. plantemoran.com {ipad Security} plantemoran.com for K-12 Understanding & Mitigating Risk Plante Moran The ipad is in K-12. Since its debut in April 2010, the ipad has quickly become the most popular tablet, outselling

More information

Choose Your Own Device (CYOD) and Mobile Device Management. gsolutionz.com

Choose Your Own Device (CYOD) and Mobile Device Management. gsolutionz.com Choose Your Own Device (CYOD) and Mobile Device Management gsolutionz.com Choose Your Own Device (CYOD) and Mobile Device Management 2 gsolutionz.com People are starting to expect the ability to connect

More information

State of Mobility Survey. France Results

State of Mobility Survey. France Results State of Mobility Survey France Results Methodology Survey performed by Applied Research 6,275 global organizations 43 countries NAM 2 LAM 14 EMEA 13 APJ 14 SMBs: Individuals in charge of computers Enterprises:

More information

Mobile Devices: Know the RISKS. Take the STEPS. PROTECT AND SECURE Health Information.

Mobile Devices: Know the RISKS. Take the STEPS. PROTECT AND SECURE Health Information. Mobile Devices: Know the RISKS. Take the STEPS. PROTECT AND SECURE Health Information. Mobile Devices: Risks to to Health Mobile Information Devices: Risks to Health Information Risks vary based on the

More information

Readiness Assessments: Vital to Secure Mobility

Readiness Assessments: Vital to Secure Mobility White Paper Readiness Assessments: Vital to Secure Mobility What You Will Learn Mobile devices have been proven to increase employee productivity and job satisfaction, but can also pose significant threats

More information

How Technology Executives are Managing the Shift to BYOD

How Technology Executives are Managing the Shift to BYOD A UBM TECHWEB WHITE PAPER SEPTEMBER 2012 How Technology Executives are Managing the Shift to BYOD An analysis of the benefits and hurdles of enabling employees to use their own consumer devices in the

More information

PREP Course #25: Hot Topics in Cyber Security and Database Security. Presented by: Joe Baskin Manager, Information Security, OCIO JBaskin@nshs.

PREP Course #25: Hot Topics in Cyber Security and Database Security. Presented by: Joe Baskin Manager, Information Security, OCIO JBaskin@nshs. PREP Course #25: Hot Topics in Cyber Security and Database Security Presented by: Joe Baskin Manager, Information Security, OCIO JBaskin@nshs.edu Objectives Discuss hot topics in cyber security and database

More information

BYOD PARTNER QUESTIONS YOU SHOULD ASK BEFORE CHOOSING A. businessresources.t-mobile.com/resources. A Buyer s Guide for Today s IT Decision Maker

BYOD PARTNER QUESTIONS YOU SHOULD ASK BEFORE CHOOSING A. businessresources.t-mobile.com/resources. A Buyer s Guide for Today s IT Decision Maker QUESTIONS YOU SHOULD ASK BEFORE CHOOSING A BYOD PARTNER 2013 T-Mobile USA, Inc. TABLE OF CONTENTS Which BYOD model is right for your organization? Have you identified the pros and cons?... 3 Other factors

More information

Mobile Devices Policy

Mobile Devices Policy Mobile Devices Policy Item Policy description Division Director Contact Description Guidelines to ensure that mobile devices are deployed and used in a secure and appropriate manner. IT Services and Records

More information

Tuesday, June 5, 12. Mobile Device Usage

Tuesday, June 5, 12. Mobile Device Usage Mobile Device Usage Remeber This? The original, live presentation included the embedded video below: http://www.youtube.com/watch?v=bo-nft2mohi A Changing Industry Proliferation of Smart Phones and Tablets.

More information

A number of factors contribute to the diminished regard for security:

A number of factors contribute to the diminished regard for security: TrendLabs Enterprises cite security as their number one concern with regard to consumerization. During the actual execution of a consumerization strategy, however, IT groups find that the increasing demand

More information

BYOD At Your Own Risk Working in the BYOD Era. Shane Swilley swilley@cosgravelaw.com (503)276-6074

BYOD At Your Own Risk Working in the BYOD Era. Shane Swilley swilley@cosgravelaw.com (503)276-6074 BYOD At Your Own Risk Working in the BYOD Era Shane Swilley swilley@cosgravelaw.com (503)276-6074 Remember when mobile technology was more Hollywood fantasy than reality The original Smart Phone By the

More information

TOP 10 TIPS FOR EDUCATING EMPLOYEES ABOUT CYBERSECURITY

TOP 10 TIPS FOR EDUCATING EMPLOYEES ABOUT CYBERSECURITY TOP 10 TIPS FOR EDUCATING EMPLOYEES ABOUT CYBERSECURITY An Inside Job Cyberthreats to your business are usually blamed on outsiders nefarious programmers writing malicious code designed to pilfer your

More information

2012 NCSA / Symantec. National Small Business Study

2012 NCSA / Symantec. National Small Business Study 2012 NCSA / Symantec National Small Business Study National Cyber Security Alliance Symantec JZ Analytics October 2012 Methodology and Sample Characteristics JZ Analytics was commissioned by the National

More information

Top Five Ways to Protect Your Network. A MainNerve Whitepaper

Top Five Ways to Protect Your Network. A MainNerve Whitepaper A MainNerve Whitepaper Overview The data security challenges within the business world have never been as challenging as they are today. Not only must organizations providers comply with stringent State

More information

Antivirus and Malware Prevention Policy and Procedures (Template) Employee Personal Device Use Terms and Conditions (Template)

Antivirus and Malware Prevention Policy and Procedures (Template) Employee Personal Device Use Terms and Conditions (Template) Below you will find the following sample policies: Antivirus and Malware Prevention Policy and Procedures (Template) Employee Personal Device Use Terms and Conditions (Template) *Log in to erisk Hub for

More information

4 Steps to Effective Mobile Application Security

4 Steps to Effective Mobile Application Security Mobile Application Security Whitepaper 4 Steps to Effective Mobile Application Security Table of Contents Executive Summary 3 Mobile Security Risks in Enterprise Environments 4 The Shortcomings of Traditional

More information

Detecting Cyber Attacks in a Mobile and BYOD Organization

Detecting Cyber Attacks in a Mobile and BYOD Organization SOLUTION BRIEF Detecting Cyber Attacks in a Mobile and BYOD Organization Explore the challenges, understand the needs, evaluate mobile device management as an approach to detecting attacks and offer a

More information

The Increasing Threat of Malware for Android Devices. 6 Ways Hackers Are Stealing Your Private Data and How to Stop Them

The Increasing Threat of Malware for Android Devices. 6 Ways Hackers Are Stealing Your Private Data and How to Stop Them The Increasing Threat of Malware for Android Devices 6 Ways Hackers Are Stealing Your Private Data and How to Stop Them INTRODUCTION If you own a smartphone running the Android operating system, like the

More information

BYOD. Bring Your Own Device - Mobile Device Management. www.prooncall.com

BYOD. Bring Your Own Device - Mobile Device Management. www.prooncall.com BYOD Bring Your Own Device - Mobile Device Management www.prooncall.com Bring Your Own Device (BYOD) Mobile Device Management People are starting to expect the ability to connect to public networks and

More information

BYOD THE SMALL BUSINESS GUIDE TO BRING YOUR OWN DEVICE

BYOD THE SMALL BUSINESS GUIDE TO BRING YOUR OWN DEVICE BYOD THE SMALL BUSINESS GUIDE TO BRING YOUR OWN DEVICE INTRODUCTION The technological revolution has made us dependent on our mobile devices, whether we re at home, in the office, on the go or anywhere

More information

My CEO wants an ipad now what? Mobile Security for the Enterprise

My CEO wants an ipad now what? Mobile Security for the Enterprise My CEO wants an ipad now what? Mobile Security for the Enterprise Agenda Introductions Emerging Mobile Trends Mobile Risk Landscape Response Framework Closing Thoughts 2 Introductions Amandeep Lamba Manager

More information

BYOD. opos WHAT IS YOUR POLICY? SUMMARY

BYOD. opos WHAT IS YOUR POLICY? SUMMARY BYOD WHAT IS YOUR POLICY? opos SUMMARY The organization s employees and contractors frequently perform employment-related tasks which require connecting to the organization s networks, systems, and/or

More information

National Cyber Security Month 2015: Daily Security Awareness Tips

National Cyber Security Month 2015: Daily Security Awareness Tips National Cyber Security Month 2015: Daily Security Awareness Tips October 1 New Threats Are Constantly Being Developed. Protect Your Home Computer and Personal Devices by Automatically Installing OS Updates.

More information

BYOD Policies: A Litigation Perspective

BYOD Policies: A Litigation Perspective General Counsel Panel Reveals the Real Deal BYOD Policies: A Litigation Perspective By Andrew Hinkes Reprinted with Permission BYOD Policies: A Litigation Perspective By Andrew Hinkes Bring-your-own-device

More information

Mobile Devices: Know the RISKS. Take the STEPS. PROTECT AND SECURE Health Information.

Mobile Devices: Know the RISKS. Take the STEPS. PROTECT AND SECURE Health Information. Mobile Devices: Know the RISKS. Take the STEPS. PROTECT AND SECURE Health Information. Mobile Devices: Risks to Health Information Risks vary based on the mobile device and its use. Some risks include:

More information

Don t Let A Security Breach Put You Out of Business

Don t Let A Security Breach Put You Out of Business Don t Let A Security Breach Put You Out of Business Committed to providing you with the most innovative security and privacy solutions. www.boomtechit.com Bring Your Own Device (BYOD) and Mobile Device

More information

Global IT Security Risks: 2012

Global IT Security Risks: 2012 Global IT Security Risks: 2012 Kaspersky Lab is a leading developer of secure content and threat management solutions and was recently named a Leader in the Gartner Magic Quadrant for Endpoint Protection

More information

Setting BYOD Policy: A New Partnership for IT and HR

Setting BYOD Policy: A New Partnership for IT and HR Introduction As the line between office and home life continues to blur, employees increasingly rely on their own smartphones, tablets, and laptop computers for work-related tasks. Today, more than 70

More information

Kaspersky Security for Mobile

Kaspersky Security for Mobile Kaspersky Security for Mobile See. Control. Protect. MOVING TARGETS Mobile devices play a key role in connectivity and productivity. But they also introduce new risks to the business: in the past 12 months

More information

SECURING TODAY S MOBILE WORKFORCE

SECURING TODAY S MOBILE WORKFORCE WHITE PAPER SECURING TODAY S MOBILE WORKFORCE Connect, Secure, and Manage Mobile Devices and Users with Junos Pulse and the Junos Pulse Mobile Security Suite Copyright 2011, Juniper Networks, Inc. Table

More information

Emerging threats for the healthcare industry: The BYOD. By Luca Sambucci www.deepsecurity.us

Emerging threats for the healthcare industry: The BYOD. By Luca Sambucci www.deepsecurity.us Emerging threats for the healthcare industry: The BYOD Revolution By Luca Sambucci www.deepsecurity.us Copyright 2013 Emerging threats for the healthcare industry: The BYOD REVOLUTION Copyright 2013 Luca

More information

Hot Topics in IT Security PREP#28 May 1, 2014. David Woska, Ph.D. OCIO Security

Hot Topics in IT Security PREP#28 May 1, 2014. David Woska, Ph.D. OCIO Security Hot Topics in IT Security PREP#28 May 1, 2014 David Woska, Ph.D. OCIO Security CME Disclosure Statement The North Shore LIJ Health System adheres to the ACCME s new Standards for Commercial Support. Any

More information

Samsung Mobile Security

Samsung Mobile Security Samsung Mobile Security offering enhanced core capabilities for enterprise mobility Samsung Enterprise Mobility Enterprise-ready Mobility management for your business Samsung Mobile Security offers enterprise

More information

How To Handle A Bring Your Own Device (Byod) In A Business

How To Handle A Bring Your Own Device (Byod) In A Business page 2 Consumers soon found that the devices they used in their personal lives could also be used in their professional lives. They could access not only the internet, but their business network as well.

More information

Setting BYOD Policy: A New Partnership for IT and HR

Setting BYOD Policy: A New Partnership for IT and HR Introduction As the line between office and home life continues to blur, employees increasingly rely on their own smartphones, tablets, and laptop computers for work-related tasks. Today, more than 70

More information

Use Bring-Your-Own-Device Programs Securely

Use Bring-Your-Own-Device Programs Securely Use Bring-Your-Own-Device Programs Securely By Dale Gonzalez December 2012 Bring-your-own-device (BYOD) programs, which allow employees to use their personal smartphones, tablets and laptops in and out

More information

Cyber Security. An Executive Imperative for Business Owners. 77 Westport Plaza, St. Louis, MO 63416 p 314.439.4700 f 314.439.4799

Cyber Security. An Executive Imperative for Business Owners. 77 Westport Plaza, St. Louis, MO 63416 p 314.439.4700 f 314.439.4799 Cyber Security An Executive Imperative for Business Owners SSE Network Services www.ssenetwork.com 77 Westport Plaza, St. Louis, MO 63416 p 314.439.4700 f 314.439.4799 Pretecht SM by SSE predicts and remedies

More information

North Carolina Health Information Management Association February 20, 2013 Chris Apgar, CISSP

North Carolina Health Information Management Association February 20, 2013 Chris Apgar, CISSP Mobile Device Management Risky Business in Healthcare North Carolina Health Information Management Association February 20, 2013 Chris Apgar, CISSP Agenda HIPAA/HITECH & Mobile Devices Breaches Federal

More information

YOUR DATA UNDER SIEGE. PROTECTION IN THE AGE OF BYODS. With Kaspersky, now you can. kaspersky.com/business Be Ready for What s Next

YOUR DATA UNDER SIEGE. PROTECTION IN THE AGE OF BYODS. With Kaspersky, now you can. kaspersky.com/business Be Ready for What s Next YOUR DATA UNDER SIEGE. PROTECTION IN THE AGE OF BYODS. With Kaspersky, now you can. kaspersky.com/business Be Ready for What s Next Your Data Under Siege. Protection in the Age of BYODs 1.0 As the workplace

More information

Windows Phone 8.1 in the Enterprise

Windows Phone 8.1 in the Enterprise Windows Phone 8.1 in the Enterprise Version 1.4 MobileIron 415 East Middlefield Road Mountain View, CA 94043 USA Tel. +1.650.919.8100 Fax +1.650.919.8006 info@mobileiron.com Introduction 3 Why Windows

More information

Security survey in the United States

Security survey in the United States Security survey in the United States This document contains the results of a survey on network security in 455 small and medium sized businesses, conducted in the United States in October/November 2007.

More information

BYOD Policy for [AGENCY]

BYOD Policy for [AGENCY] BYOD Policy for [AGENCY] This document provides policies, standards, and rules of behavior for the use of smartphones, tablets and/or other devices ( Device ) owned by [AGENCY] employees personally (herein

More information

POLICY NO. 3.14 September 8, 2015 TITLE: INTERNET AND EMAIL USE POLICY

POLICY NO. 3.14 September 8, 2015 TITLE: INTERNET AND EMAIL USE POLICY POLICY NO. 3.14 September 8, 2015 TITLE: INTERNET AND EMAIL USE POLICY POLICY STATEMENT: Many of our employees have access to the internet as well as email capabilities. The County recognizes that these

More information

Information Technology Acceptable Use Policies

Information Technology Acceptable Use Policies White Paper: Information Technology Acceptable Use Policies A practical guide for protecting IT assets from the largest single IT Security threat inappropriate use of IT services, including desktops, email,

More information

DISCOVER, MONITOR AND PROTECT YOUR SENSITIVE INFORMATION Symantec Data Loss Prevention. symantec.com

DISCOVER, MONITOR AND PROTECT YOUR SENSITIVE INFORMATION Symantec Data Loss Prevention. symantec.com DISCOVER, MONITOR AND PROTECT YOUR SENSITIVE INFORMATION Symantec Data Loss Prevention symantec.com One of the interesting things we ve found is that a lot of the activity you d expect to be malicious

More information

White Paper: The Current State of BYOD

White Paper: The Current State of BYOD CTOlabs.com White Paper: The Current State of BYOD May 2012 A White Paper providing context and guidance you can use Inside: Snapshot of a fast moving trend Summary of recent surveys Considerations for

More information

10 best practice suggestions for common smartphone threats

10 best practice suggestions for common smartphone threats 10 best practice suggestions for common smartphone threats Jeff R Fawcett Dell SecureWorks Security Practice Executive M Brandon Swain Dell SecureWorks Security Practice Executive When using your Bluetooth

More information

DECISION MAKER S GUIDE: DEVELOPING A BRING YOUR OWN DEVICE STRATEGY

DECISION MAKER S GUIDE: DEVELOPING A BRING YOUR OWN DEVICE STRATEGY GUIDE DECISION MAKER S GUIDE: DEVELOPING A BRING YOUR OWN DEVICE STRATEGY Giving you a head start in successfully developing and supporting the right BYOD strategy for your organisation TRANSFORMING COMMUNICATIONS

More information

Mobility, Security Concerns, and Avoidance

Mobility, Security Concerns, and Avoidance By Jorge García, Technology Evaluation Centers Technology Evaluation Centers Mobile Challenges: An Overview Data drives business today, as IT managers and security executives face enormous pressure to

More information

Keep Calm and Bring Your Own DEVICE. White paper

Keep Calm and Bring Your Own DEVICE. White paper Keep Calm and Bring Your Own DEVICE White paper Keep Calm and Bring Your Own How a cooperative and self-sealing technology ecosystem makes it safer to BYOD Executive Summary The consumerization of IT and

More information

Securing Health Data in a BYOD World

Securing Health Data in a BYOD World BUSINESS WHITE PAPER Securing Health Data in a BYOD World Five strategies to minimize risk Securing Health Data in a BYOD World Table of Contents 2 Introduction 3 BYOD adoption drivers 4 BYOD security

More information

Global Corporate IT Security Risks: 2013

Global Corporate IT Security Risks: 2013 Global Corporate IT Security Risks: 2013 May 2013 For Kaspersky Lab, the world s largest private developer of advanced security solutions for home users and corporate IT infrastructures, meeting the needs

More information

Conducting a Risk Assessment for Mobile Devices

Conducting a Risk Assessment for Mobile Devices Conducting a Assessment for Mobile Devices May 9, 2012 David Frei Director, Digital/Information Security Specialist The Changing Environment Today s Discussion Available Industry Assessment Models Unique

More information

PHI- Protected Health Information

PHI- Protected Health Information HIPAA Policy 2014 The Health Insurance Portability and Accountability Act is a federal law that protects the privacy and security of patients health information and grants certain rights to patients. Clarkson

More information

Security Breaches. There are unscrupulous individuals, like identity thieves, who want your information to commit fraud.

Security Breaches. There are unscrupulous individuals, like identity thieves, who want your information to commit fraud. IDENTITY THEFT Security Breaches Our economy generates an enormous amount of data. Most users of that information are from honest businesses - getting and giving legitimate information. Despite the benefits

More information

BYOD AND ME. How cell phone hacking effects your business.! Richard Rigby CEO Wraith Intelligence

BYOD AND ME. How cell phone hacking effects your business.! Richard Rigby CEO Wraith Intelligence BYOD AND ME How cell phone hacking effects your business! Richard Rigby CEO Wraith Intelligence 90% of companies will offer BYOD, or bring-your-own-device options to employees by 2014, according to Gartner.

More information

overview Enterprise Security Solutions

overview Enterprise Security Solutions Enterprise Security Solutions overview For more than 25 years, Trend Micro has innovated constantly to keep our customers ahead of an ever-evolving IT threat landscape. It s how we got to be the world

More information

Enterprise Cybersecurity Best Practices Part Number MAN-00363 Revision 006

Enterprise Cybersecurity Best Practices Part Number MAN-00363 Revision 006 Enterprise Cybersecurity Best Practices Part Number MAN-00363 Revision 006 April 2013 Hologic and the Hologic Logo are trademarks or registered trademarks of Hologic, Inc. Microsoft, Active Directory,

More information

10 Quick Tips to Mobile Security

10 Quick Tips to Mobile Security 10 Quick Tips to Mobile Security 10 Quick Tips to Mobile Security contents 03 Introduction 05 Mobile Threats and Consequences 06 Important Mobile Statistics 07 Top 10 Mobile Safety Tips 19 Resources 22

More information

Top 10 Tips to Keep Your Small Business Safe

Top 10 Tips to Keep Your Small Business Safe Securing Your Web World Top 10 Tips to Keep Your Small Business Safe Protecting your business against the latest Web threats has become an incredibly complicated task. The consequences of external attacks,

More information

The Key to Secure Online Financial Transactions

The Key to Secure Online Financial Transactions Transaction Security The Key to Secure Online Financial Transactions Transferring money, shopping, or paying debts online is no longer a novelty. These days, it s just one of many daily occurrences on

More information

A 5-STEP PLAN TO PREPARE FOR HEALTHCARE. A Complimentary White Paper from

A 5-STEP PLAN TO PREPARE FOR HEALTHCARE. A Complimentary White Paper from A 5-STEP PLAN TO PREPARE FOR BYOD IN HEALTHCARE A Complimentary White Paper from A 5-step plan to prepare for BYOD in health care A Complimentary White Paper from Healthcare Business & Technology Nearly

More information

A LEGAL PERSPECTIVE OF BYOD Building Awareness to Enable BYOD and Mitigate Its Risks. By Michael Finneran and Jim Brashear January 2014

A LEGAL PERSPECTIVE OF BYOD Building Awareness to Enable BYOD and Mitigate Its Risks. By Michael Finneran and Jim Brashear January 2014 A LEGAL PERSPECTIVE OF BYOD Building Awareness to Enable BYOD and Mitigate Its Risks By Michael Finneran and Jim Brashear January 2014 What to Consider In managing the Bring-Your-Own-Device (BYOD) strategy

More information

Building a Business Case:

Building a Business Case: Building a Business Case: Cloud-Based Security for Small and Medium-Size Businesses table of contents + Key Business Drivers... 3... 4... 6 A TechTarget White Paper brought to you by Investing in IT security

More information

Mobile Devices in the Workplace: What Every Employer Needs to Know

Mobile Devices in the Workplace: What Every Employer Needs to Know Mobile Devices in the Workplace: What Every Employer Needs to Know Presented by: Shannon Huygens Paliotta Senior Associate, Littler Mendelson, P.C. spaliotta@littler.com (412) 201-7631 Marcy McGovern Knowledge

More information

How To Protect Your Mobile Devices From Security Threats

How To Protect Your Mobile Devices From Security Threats Back to the Future: Securing your Unwired Enterprise By Manoj Kumar Kunta, Global Practice Leader - Security Back to the Future: Securing your Unwired Enterprise The advent of smartphones and tablets has

More information

Mitigating Bring Your Own Device (BYOD) Risk for Organisations

Mitigating Bring Your Own Device (BYOD) Risk for Organisations Mitigating Bring Your Own Device (BYOD) Risk for Organisations Harness the benefits and mitigate the risks of BYOD espiongroup.com Executive Summary Mobile devices such as smart phones, tablets, or laptops

More information

Security, privacy, and incident response issues are often

Security, privacy, and incident response issues are often ISSA DEVELOPING AND CONNECTING CYBERSECURITY LEADERS GLOBALLY The Legal Implications of BYOD: Preparing Personal Device Use Policies By David Navetta, Esq. ISSA member, Denver, USA Chapter This article

More information

BYOD: Should Convenience Trump Security? Francis Tam, Partner Kevin Villanueva, Senior Manager

BYOD: Should Convenience Trump Security? Francis Tam, Partner Kevin Villanueva, Senior Manager BYOD: Should Convenience Trump Security? Francis Tam, Partner Kevin Villanueva, Senior Manager 1 AGENDA Mobile Explosion Mobile Trends BYOD Benefits, Challenges and Threats BYOD Security BYOD Strategy

More information

Iowa Health Information Network (IHIN) Security Incident Response Plan

Iowa Health Information Network (IHIN) Security Incident Response Plan Iowa Health Information Network (IHIN) Security Incident Response Plan I. Scope This plan identifies the responsible parties and action steps to be taken in response to Security Incidents. IHIN Security

More information

Control Issues and Mobile Devices

Control Issues and Mobile Devices Control Issues and Mobile Devices ACC 626 Term Paper Ramandip Kaur June 27, 2014 Page Table of Contents Executive Summary...ii 1.0 Introduction... 1 2.0 Current Trends... 1 2.1 Employee Owned Devices and

More information

1. For each of the 25 questions, multiply each question response risk value (1-5) by the number of times it was chosen by the survey takers.

1. For each of the 25 questions, multiply each question response risk value (1-5) by the number of times it was chosen by the survey takers. Employee Security Awareness Survey Trenton Bond trent.bond@gmail.com Admin - Version 1.3 Security Awareness One of the most significant security risks that organizations and corporations face today is

More information

IT TRENDS AND FUTURE CONSIDERATIONS. Paul Rainbow CPA, CISA, CIA, CISSP, CTGA

IT TRENDS AND FUTURE CONSIDERATIONS. Paul Rainbow CPA, CISA, CIA, CISSP, CTGA IT TRENDS AND FUTURE CONSIDERATIONS Paul Rainbow CPA, CISA, CIA, CISSP, CTGA AGENDA BYOD Cloud Computing PCI Fraud Internet Banking Questions The Mobile Explosion Mobile traffic data in 2011 was nearly

More information

Five Trends to Track in E-Commerce Fraud

Five Trends to Track in E-Commerce Fraud Five Trends to Track in E-Commerce Fraud Fraud is nothing new if you re in the e-commerce business you probably have a baseline level of fraud losses due to stolen credit cards, return fraud and other

More information

THE SECURITY OF HOSTED EXCHANGE FOR SMBs

THE SECURITY OF HOSTED EXCHANGE FOR SMBs THE SECURITY OF HOSTED EXCHANGE FOR SMBs In the interest of security and cost-efficiency, many businesses are turning to hosted Microsoft Exchange for the scalability, ease of use and accessibility available

More information

COMMONWEALTH OF PENNSYLVANIA DEPARTMENT S OF PUBLIC WELFARE, INSURANCE AND AGING

COMMONWEALTH OF PENNSYLVANIA DEPARTMENT S OF PUBLIC WELFARE, INSURANCE AND AGING COMMONWEALTH OF PENNSYLVANIA DEPARTMENT S OF PUBLIC WELFARE, INSURANCE AND AGING INFORMATION TECHNOLOGY STANDARD Name Of Standard: Mobile Device Standard Domain: Security Date Issued: 09/07/2012 Date Revised:

More information

Use of Mobile Apps in the Workplace:

Use of Mobile Apps in the Workplace: Use of Mobile Apps in the Workplace: PRIVACY & SECURITY ADAM D.H. GRANT AGRANT@ALPERTBARR.COM Cell Phone & Tablet Ownership 91% of American adults own a cell phone 56% have smartphones Of Americans aged

More information

overview Enterprise Security Solutions

overview Enterprise Security Solutions Enterprise Security Solutions overview For more than 25 years, Trend Micro has innovated constantly to keep our customers ahead of an ever-evolving IT threat landscape. It s how we got to be the world

More information

Marlon R Clarke, Ph. D., CISSP, CISM Director Network Operations and Services, NSU 10-17-2013

Marlon R Clarke, Ph. D., CISSP, CISM Director Network Operations and Services, NSU 10-17-2013 Marlon R Clarke, Ph. D., CISSP, CISM Director Network Operations and Services, NSU 10-17-2013 Todays Discussion Overview of Computer and Internet Security What is Computer and Internet Security Who Should

More information

BYOD: Bring Your Own Device Advantage, Liability or Both?

BYOD: Bring Your Own Device Advantage, Liability or Both? BYOD: Bring Your Own Device Advantage, Liability or Both? S S Scott Summers Laura B. Grubbs Dinsmore & Shohl Louisville, KY The BYOD to Work Movement Dual-Use Devices: used for both personal and company

More information