BYOD Bring Your Own Device Personal Devices in a Corporate World
|
|
- Benjamin O’Connor’
- 8 years ago
- Views:
Transcription
1 A Member of OneBeacon Insurance Group BYOD Bring Your Own Device Personal Devices in a Corporate World Author: Elizabeth Marazzo, Risk Control Specialist Published: July 2014 Executive Summary What, Why and How? Bring Your Own Device or BYOD is quickly becoming a workplace technology trend Essentially, BYOD is the policy of allowing employees to bring their personally owned devices such as smartphones, laptops and tablets to work and using these devices to access private company information, systems and applications Wait, hold on; what happened to the fear of virus intrusions because of the apps sitting on your mobile device or fear from unsecured devices? Yes, times are changing and today, this practice is not only okay, but it s gaining traction and introducing a new set of risks Although the term BYOD was not fully recognized until 2011, its origins can be traced to 2009 at Intel, when it recognized an increasing number of employees bringing their own devices to work and connecting them to the corporate network 1 There is a lot of talk suggesting BYOD will be the next big shift in corporate computing And yet there is a lot of confusion about potential implications for the IT department How would data security be managed? Would IT be tasked with supporting every conceivable computing device? How would they keep track of personal devices and would this overtax the IT group? On the other side of the spectrum, organizations see this as an opportunity to increase employee productivity on devices they love, while reducing the company s mobile expenses Many organizations are implementing a BYOD policy with varying approaches and varying results Some companies with BYOD models require employees to cover all costs (purchase, monthly fees, etc), while others may partially reimburse employees Businesses that embrace a BYOD policy are seeing a reduction in their mobile expenses as mobile device costs become the employee s responsibility Organizations in the technology space are more likely to adopt a liberal BYOD strategy while those in healthcare, government, security and finance may take a conservative approach It is predicted that by 2017 half of the world s companies will implement BYOD programs and will no longer provide computing devices to employees, according to a recent Gartner report The report also predicted that about 15% of companies will never move to BYOD and about 40% will offer employees the choice of BYOD or company-provided devices 2 Research conducted by HDI in November 2013 indicated an increase in the implementation of BYOD programs for both tablets and mobile phones It also noted that organizations have implemented improved mobile device management systems with well-defined polices, and are better able to keep up with the pace of mobile device innovation This evidence reinforces overall industry maturing in support of mobile devices 3 1
2 Benefits Why has this phenomena gained traction? First and foremost are the personal and productivity benefits BYOD is fueled by users who expect total flexibility in managing their professional and personal business wherever they are, on their device of choice 4 Employee Satisfaction - Employees love their own devices and prefer to use them Furthermore, the familiarity with their device is likely to increase the employee s motivation and productivity levels One Device vs Two - For an employee, the BYOD process eliminates the need to carry both a corporate and personal mobile device, making day-to-day activities more manageable However, some employees may prefer to have strict boundaries between work and personal matters and are likely to maintain multiple devices Companies see a great benefit from this single-device approach as employees are always available Since their personal device is typically nearby, they are likely to respond more quickly to customer and corporate requests such as s, texts and social media feeds Cutting- Edge Devices - Since BYOD devices are personal resources, they tend to be more cutting edge, so the company gains the benefit of the latest features and capabilities, without having to pay for these upgrades Employees also tend to upgrade their personal devices to the latest hardware more frequently than most organizations Risks Unfortunately, not all that glitters is gold A recent survey by InformationWeek yielded some startling statistics regarding BYOD matters: 5 7% of BYOD environments do not have password-based access control, simply relying on the company s BYOD policy Only 53% require password lengths greater than four characters for primary access on the mobile devices 2
3 42% do not scan personal devices for malware 45% have had a mobile device where enterprise data came up missing in the past year 13% do not require encryption on devices containing enterprise data 28% stated they were not subject to data protection regulations (eg, SOX, HIPAA, PCI and State-based), even though they likely were 68% support BYOD but only 39% currently have a mobile device management or MDM solution There are several risks and challenges that must be addressed before an organization implements BYOD Data Security - security on the device may be compromised from infected data, attachments or apps, which can possibly lead to infections or attacks on the rest of the corporate network With the increased use of smartphones, cybercrime has also gone up 6 Some of the data on the phone could seriously compromise the company s security if that information fell into the wrong hands Passwords stored inappropriately on the mobile device, or a device with weak password could give a hacker or criminal direct access to the company s corporate systems e-discovery - This refers to an employer s legal obligation to access and present critical data in the event of pending litigation The data may reside on either the corporate or personal device Attempting to access its corporate data on an employee s personal device may result in additional legal obstacles due to the employee s privacy rights A recent federal case Lazette v Kulmatycki, (June 5, 2013 in the northern district of Ohio), the US District court denied a motion to dismiss the plaintiff s complaint for invasion of privacy In this case, the former employee, who was allowed to use the company-issued mobile device for personal , alleged that after her employment ended her supervisor accessed 48,000 messages and shared some personal information with third parties The court found that a company s search of private employee data on a mobile device violated the Stored Communications Act because such a search was unauthorized even though in this case, the device was owned by the company 7 BYOD presents four primary challenges for e-discovery 8 : Access and control of data and the device since the company does not own or physically control the devices There are multiple categories of data to consider, such as personal and corporate, which are stored in the same environment Data may reside in various locations and it is possible that critical corporate data exists solely on the personal device The employer may find it difficult to safeguard and retrieve the data from personal devices Personal Injury - What if an employee files for a claim such as repetitive motion associated with using their own mobile device; is this compensable? There have already been a few such cases where employees have filed a claim that resulted from the use of their personal devices 9 In a regular work environment, employers can manage their cost and risk through workplace safety training, providing ergonomically designed equipment, etc But what if the employee gets BlackBerry thumbs from their own device? Can they take action against their employer? Who is responsible? How much of this stems from personal versus corporate use of the same device? Data Corruption and Deletion - BYOD devices can include laptops, netbooks and ultrabooks in addition to smartphones and tablets These devices need to be updated to meet company s network security requirements, such as software patches and revisions Imagine if the employee is working on an important personal project the great American novel and it ends up being 3
4 deleted or becomes inaccessible due to a company required software update or patch Can the employee take legal actions against his employer for this information loss? What recourse does the employee have, if any? Device Sharing - An employee could be sharing the device with someone else, such as a spouse or child Due to multiple users, they could inadvertently violate corporate policies or procedures regarding apps or sites that can be loaded, used and viewed on the device They may also establish insecure but easy to remember passwords on the device This could result in potential issues, including corporate data loss or security breaches There is also a potential for third-party legal liability against the company if there is loss of data that is owned by the spouse or person sharing the employee s device An example would be a spouse who used the personal device to photograph an important one-time life event The company, in the course of routine device management, deletes the photos, which are the only copies How does the company protect itself against claims from the third-party since the company does not have any policy or contract with that individual? Revoked or Lost Devices - What happens when an employee sells or recycles a device after an upgrade, or their device is stolen or lost? Or what if an employee is terminated or leaves the company? The mobile device contains company information but employees clearly retain their own personal device Unless the company has a policy in place, this presents potential data breach exposures Compensation Issues - The BYOD program makes it easier for employees to work outside of normal working hours thus presenting some issues under the Fair Labor Standards Act (FLSA) FLSA requires employers to pay non-exempt employees at least minimum wage for all compensable time worked, and to further pay these employees overtime pay for hours worked in excess of 40 hours a week Generally, compensable time includes work performed for an employer such as responding to s, time spent on tablets, smartphones and laptops to complete a project, etc This may constitute compensable time for FLSA purposes which, if not paid, can lead to liability Employers who allow non-exempt employees to participate in the BYOD program can minimize this risk by incorporating timekeeping policies in their BYOD program to limit and capture time spent outside of the office or normal business hours and state that employees are expected to report all time worked 10 Is BYOD the way to go for your company? Adopting BYOD is a company-specific decision that must align with the balance of the corporate culture and practices Some organizations may thrive while others may see it is as a detriment A survey conducted by Logicalis concluded that employees in high-growth markets are not only willing but embrace the possibility of having constant access to work data and applications even when outside of normal business hours These employees demonstrate a willingness to do whatever it takes and work whatever hours are required in order to advance their careers To date, BYOD adoption is most common in companies with revenues between $500 million and $5 billion, but with geographic differences, according to Gartner The highest rate of adoption is in India, China and Brazil, with US adopting at twice the European level 11 If you are thinking of implementing BYOD, here are some questions you need to consider Is mobile access a must? What are the goals and benefits of BYOD? (Improved productivity? Better business processes?) Which group of your workforce needs mobile access? Which data or systems will employees need to access via BYOD? 4
5 What sensitivities are there around these systems and data? Are there any other benefits BYOD can offer for your organization? Have you done a full risk assessment including assessing the legal issues? Will BYOD require the company to establish new HR policies? BYOD Management If your organization decides to implement BYOD, risks will need to be managed effectively, including employee privacy Adoption requires striking a balance between the company s right to monitor, access, review, data-wipe, and disclose company information and the employee s expectation of privacy and safeguarding of personal data Historically, devices resided within the corporate network and were trustworthy Now with personal mobile devices and an ever-increasing number of malware and hackers, security and management concerns are at the top on the list How can we trust and ensure that these mobile devices will behave within the corporate network? Luckily we can counter these risks Mobile Security Expert Designate a specialist who educates users on social and behavioral security risks, sets appropriate use policy and helps develop strategies for mobile security and risk mitigation, mobile data protection, mobile OS platform review and, mobile application threat management 12 BYOD Policy & Procedures - Document and publicize a BYOD policy According to a recent study, 571% of full-time employees partake in some form of BYOD, but only 20% have been asked to read and acknowledge a BYOD policy Another study found that 78% of firms that moved to BYOD do not have a policy at all 13 Without a policy in place, organizations cannot exercise control over the fine line between corporate and personal use, and adequately protect both parties Remember, BYOD policies are somewhat complex and require collaboration between HR, Legal and IT functions Access Control Consider the use of strong and robust passwords to access and log on to both the device and the network The security system should clearly establish the identity of the user and device accessing the network, with a defined policy governing access levels and data that can be accessed and saved or transferred Lastly, the system should be able to maintain logs on who accessed the system, when they logged on and the type of data that was viewed and transferred Malware and Antivirus - There are some effective technologies available to protect corporate data and keep malware off the company network Anti-malware software is available and should be installed on personal devices to protect them against the very latest viruses, Trojans, spyware, worms, bots and other malicious code Other types of software will also include anti-spam technologies to filter unwanted calls and texts on the mobile device Another feature to consider is anti-phishing tools and policies to help prevent inadvertent visits to fraudulent websites that may try to steal information Geofencing - Some companies have also put into place geofencing, which creates a virtual perimeter or boundary that will let employees use and/or play games but just not during company time This can also prevent employees from downloading high definition videos on their tablets that could clog up the company network MDM or Mobile Device Management With the variety of personal devices available, it may not be practical to manage these through internal IT Consider software tools to manage mobile devices through a variety of vendors such as Airwatch, MobileIron, Citrix, Good Technology, IBM and others These companies provide services and solutions that will help facilitate controlling these risks These companies can deploy security agents onto each device; implement security policies 5
6 on the devices, separate personal and corporate data and also enable selective wiping of corporate data without deleting the employee s data They can also enable encryption on the devices, as well as protect data when a device is lost or stolen Encryption is an excellent method for ensuring that any information or data stored on a mobile device is useless to thieves Conclusion Regardless of whether you are already taking advantage of the BYOD trend or you re simply thinking about it, make sure that you are fully aware of the risks and that you thoughtfully address any potential issues Security, risk management, remediation and policy development should be considered before setting up a BYOD program Once implemented, be certain to communicate the new policy and enforce available risk mitigation steps This up-front investment will ensure that mobile expense savings can be fully realized along with a productive, appreciative workforce This thoroughness will enable making BYOD a competitive advantage Contact Us To learn more about how OneBeacon Technology Insurance can help you manage online and other technology risks, please contact Lloyd Takata, EVP of OneBeacon Technology Insurance at ltakata@onebeacontechcom or References 1 Mobile: Learn from Intel s CISO on securing employee-owned devices Accessed April Kanaracus, Chris (May 1, 2013) Half of companies will require BYOD by 2017, Gartner Says IDG News Service Accessed April gartner-sayshtml 3 HDI Research Brief, Mobile Device Support and BYOD: Where Are We Now? Written by Jenny Rains, Senior Research Analyst 4 The ultimate guide to BYOD Mobile Iron, Access April BYOD%5B5%5Dpdf?mkt_tok=3RkMMJWWfF9wsRovuK%2FNZKXonjHpfsX86%2BssUaWg 38431UFwdcjKPmjr1YQCT8N0aPyQAgobGp5I5FEITrnYU6lot6IJXg%3D%3D, page 3 5 Cohodas, Marilyn (February 3, 2014) Infographic: Mobile security run amok InformationWeek: DarkReading Accessed April Gilmore, Georgina & Beardmore, Peter (2013) Mobile security and BYOD for dummies Accessed April 2014 Page 15 & 16 s/august2013/21-byod-dummiespdf 7 BYOD: balancing employee privacy concerns against employer security needs 8 Watson, Steve (June ) Successful ediscovery in a BYOD environment Intel Whitepaper Accessed April
7 9 Casey, Kevin (November 19, 2012) 6 risks your BYOD policy must address InformationWeek Accessed April risks-your-byod-policy-must-address/d/d-id/ ? Ibid 2 12 Ibid 4, page 9 13 Gabriel, Chris (January 21, 2013) No BYOD policy, time to grasp the nettle CxUnplugged Accessed April
Bring Your Own Device (BYOD) and Mobile Device Management. tekniqueit.com
Bring Your Own Device (BYOD) and Mobile Device Management tekniqueit.com Bring Your Own Device (BYOD) and Mobile Device Management People are starting to expect the ability to connect to public networks
More informationBring Your Own Device (BYOD) and Mobile Device Management. www.cognoscape.com
Bring Your Own Device (BYOD) and Mobile Device Management www.cognoscape.com Bring Your Own Device (BYOD) and Mobile Device Management People are starting to expect the ability to connect to public networks
More informationGuideline on Safe BYOD Management
CMSGu2014-01 Mauritian Computer Emergency Response Team CERT-MU SECURITY GUIDELINE 2011-02 Enhancing Cyber Security in Mauritius Guideline on Safe BYOD Management National Computer Board Mauritius Version
More informationWhite Paper. Data Security. The Top Threat Facing Enterprises Today
White Paper Data Security The Top Threat Facing Enterprises Today CONTENTS Introduction Vulnerabilities of Mobile Devices Alarming State of Mobile Insecurity Security Best Practices What if a Device is
More informationSample Employee Agreement for Business Use of Employee-Owned Personal Computing Devices (Including Wearables 1 )
Sample Employee Agreement for Business Use of Employee-Owned Personal Computing Devices (Including Wearables 1 ) Overview: The Bring Your Own Device (BYOD) program allows employees to use their own computing
More informationCreating a Bulletproof BYOD (Bring Your Own Device) Policy for Personal Devices At Work
Creating a Bulletproof BYOD (Bring Your Own Device) Policy for Personal Devices At Work FEATURED FACULTY: Amy F. Melican, Associate, Proskauer 212.969.3641 AMelican@proskauer.com Traci Clements, Attorney,
More informationSecuring mobile devices in the business environment
IBM Global Technology Services Thought Leadership White Paper October 2011 Securing mobile devices in the business environment By I-Lung Kao, Global Strategist, IBM Security Services 2 Securing mobile
More informationSay Yes to BYOD How Fortinet Enables You to Protect Your Network from the Risk of Mobile Devices WHITE PAPER
Say Yes to BYOD How Fortinet Enables You to Protect Your Network from the Risk of Mobile Devices WHITE PAPER FORTINET Say Yes to BYOD PAGE 2 Introduction Bring Your Own Device (BYOD) and consumerization
More informationCyber Security. John Leek Chief Strategist
Cyber Security John Leek Chief Strategist AGENDA The Changing Business Landscape Acknowledge cybersecurity as an enterprise-wide risk management issue not just an IT issue How to develop a cybersecurity
More informationBring Your Own Device (BYOD) and Mobile Device Management
Bring Your Own Device (BYOD) and Mobile Device Management Intivix.com (415) 543 1033 PROFESSIONAL IT SERVICES FOR BUSINESSES OF ALL SHAPES AND SIZES People are starting to expect the ability to connect
More informationBRING YOUR OWN DEVICE (BYOD) AND MOBILE DEVICE MANAGEMENT
BRING YOUR OWN DEVICE (BYOD) AND MOBILE DEVICE MANAGEMENT www.intivix.com (415) 543 1033 HELP TEAM MEMBERS TO COLLABORATE MORE EASILY FROM ANYWHERE. People are starting to expect the ability to connect
More informationHow To Understand The Bring Your Own Device To School Policy At A School
The Thomas Hardye School Bring Your Own Device to School (BYOD) Policy for Students Adopted by Personnel & Resources Committee 1 st September 2014 Review date: 31 st August 2015 Signed by Chair:. CONTENTS
More informationInternet threats: steps to security for your small business
Internet threats: 7 steps to security for your small business Proactive solutions for small businesses A restaurant offers free WiFi to its patrons. The controller of an accounting firm receives a confidential
More informationSay Yes to BOYD How Fortinet Enables You to Protect Your Network from the Risk of Mobile Devices
Say Yes to BOYD How Fortinet Enables You to Protect Your Network from the Risk of Mobile Devices Introduction Bring Your Own Device (BYOD) and consumerization of IT are all phrases that serve to encompass
More informationA Guide to MAM and Planning for BYOD Security in the Enterprise
A Guide to MAM and Planning for BYOD Bring your own device (BYOD) can pose a couple different challenges, not only the issue of dealing with security threats, but also how to handle mobile applications.
More informationAcronis 2002-2014 BRING YOUR OWN DEVICE
Acronis 2002-2014 BRING YOUR OWN DEVICE Introduction With over a billion smartphones and tablets at arms length, a majority of your global workforce already possesses the technology needed to better connect
More informationPractical Legal Aspects of BYOD
Practical Legal Aspects of BYOD SESSION ID: LAW-F01 Lawrence Dietz General Counsel & Managing Director TalGlobal Corporation ldietz@talglobal.net +1 408 993 1300 http://psyopregiment.blogspot.com Francoise
More information{ipad Security} for K-12. Understanding & Mitigating Risk. plantemoran.com
{ipad Security} plantemoran.com for K-12 Understanding & Mitigating Risk Plante Moran The ipad is in K-12. Since its debut in April 2010, the ipad has quickly become the most popular tablet, outselling
More informationChoose Your Own Device (CYOD) and Mobile Device Management. gsolutionz.com
Choose Your Own Device (CYOD) and Mobile Device Management gsolutionz.com Choose Your Own Device (CYOD) and Mobile Device Management 2 gsolutionz.com People are starting to expect the ability to connect
More informationState of Mobility Survey. France Results
State of Mobility Survey France Results Methodology Survey performed by Applied Research 6,275 global organizations 43 countries NAM 2 LAM 14 EMEA 13 APJ 14 SMBs: Individuals in charge of computers Enterprises:
More informationMobile Devices: Know the RISKS. Take the STEPS. PROTECT AND SECURE Health Information.
Mobile Devices: Know the RISKS. Take the STEPS. PROTECT AND SECURE Health Information. Mobile Devices: Risks to to Health Mobile Information Devices: Risks to Health Information Risks vary based on the
More informationReadiness Assessments: Vital to Secure Mobility
White Paper Readiness Assessments: Vital to Secure Mobility What You Will Learn Mobile devices have been proven to increase employee productivity and job satisfaction, but can also pose significant threats
More informationHow Technology Executives are Managing the Shift to BYOD
A UBM TECHWEB WHITE PAPER SEPTEMBER 2012 How Technology Executives are Managing the Shift to BYOD An analysis of the benefits and hurdles of enabling employees to use their own consumer devices in the
More informationPREP Course #25: Hot Topics in Cyber Security and Database Security. Presented by: Joe Baskin Manager, Information Security, OCIO JBaskin@nshs.
PREP Course #25: Hot Topics in Cyber Security and Database Security Presented by: Joe Baskin Manager, Information Security, OCIO JBaskin@nshs.edu Objectives Discuss hot topics in cyber security and database
More informationBYOD PARTNER QUESTIONS YOU SHOULD ASK BEFORE CHOOSING A. businessresources.t-mobile.com/resources. A Buyer s Guide for Today s IT Decision Maker
QUESTIONS YOU SHOULD ASK BEFORE CHOOSING A BYOD PARTNER 2013 T-Mobile USA, Inc. TABLE OF CONTENTS Which BYOD model is right for your organization? Have you identified the pros and cons?... 3 Other factors
More informationMobile Devices Policy
Mobile Devices Policy Item Policy description Division Director Contact Description Guidelines to ensure that mobile devices are deployed and used in a secure and appropriate manner. IT Services and Records
More informationTuesday, June 5, 12. Mobile Device Usage
Mobile Device Usage Remeber This? The original, live presentation included the embedded video below: http://www.youtube.com/watch?v=bo-nft2mohi A Changing Industry Proliferation of Smart Phones and Tablets.
More informationA number of factors contribute to the diminished regard for security:
TrendLabs Enterprises cite security as their number one concern with regard to consumerization. During the actual execution of a consumerization strategy, however, IT groups find that the increasing demand
More informationBYOD At Your Own Risk Working in the BYOD Era. Shane Swilley swilley@cosgravelaw.com (503)276-6074
BYOD At Your Own Risk Working in the BYOD Era Shane Swilley swilley@cosgravelaw.com (503)276-6074 Remember when mobile technology was more Hollywood fantasy than reality The original Smart Phone By the
More informationTOP 10 TIPS FOR EDUCATING EMPLOYEES ABOUT CYBERSECURITY
TOP 10 TIPS FOR EDUCATING EMPLOYEES ABOUT CYBERSECURITY An Inside Job Cyberthreats to your business are usually blamed on outsiders nefarious programmers writing malicious code designed to pilfer your
More information2012 NCSA / Symantec. National Small Business Study
2012 NCSA / Symantec National Small Business Study National Cyber Security Alliance Symantec JZ Analytics October 2012 Methodology and Sample Characteristics JZ Analytics was commissioned by the National
More informationTop Five Ways to Protect Your Network. A MainNerve Whitepaper
A MainNerve Whitepaper Overview The data security challenges within the business world have never been as challenging as they are today. Not only must organizations providers comply with stringent State
More informationAntivirus and Malware Prevention Policy and Procedures (Template) Employee Personal Device Use Terms and Conditions (Template)
Below you will find the following sample policies: Antivirus and Malware Prevention Policy and Procedures (Template) Employee Personal Device Use Terms and Conditions (Template) *Log in to erisk Hub for
More information4 Steps to Effective Mobile Application Security
Mobile Application Security Whitepaper 4 Steps to Effective Mobile Application Security Table of Contents Executive Summary 3 Mobile Security Risks in Enterprise Environments 4 The Shortcomings of Traditional
More informationDetecting Cyber Attacks in a Mobile and BYOD Organization
SOLUTION BRIEF Detecting Cyber Attacks in a Mobile and BYOD Organization Explore the challenges, understand the needs, evaluate mobile device management as an approach to detecting attacks and offer a
More informationThe Increasing Threat of Malware for Android Devices. 6 Ways Hackers Are Stealing Your Private Data and How to Stop Them
The Increasing Threat of Malware for Android Devices 6 Ways Hackers Are Stealing Your Private Data and How to Stop Them INTRODUCTION If you own a smartphone running the Android operating system, like the
More informationBYOD. Bring Your Own Device - Mobile Device Management. www.prooncall.com
BYOD Bring Your Own Device - Mobile Device Management www.prooncall.com Bring Your Own Device (BYOD) Mobile Device Management People are starting to expect the ability to connect to public networks and
More informationBYOD THE SMALL BUSINESS GUIDE TO BRING YOUR OWN DEVICE
BYOD THE SMALL BUSINESS GUIDE TO BRING YOUR OWN DEVICE INTRODUCTION The technological revolution has made us dependent on our mobile devices, whether we re at home, in the office, on the go or anywhere
More informationMy CEO wants an ipad now what? Mobile Security for the Enterprise
My CEO wants an ipad now what? Mobile Security for the Enterprise Agenda Introductions Emerging Mobile Trends Mobile Risk Landscape Response Framework Closing Thoughts 2 Introductions Amandeep Lamba Manager
More informationBYOD. opos WHAT IS YOUR POLICY? SUMMARY
BYOD WHAT IS YOUR POLICY? opos SUMMARY The organization s employees and contractors frequently perform employment-related tasks which require connecting to the organization s networks, systems, and/or
More informationNational Cyber Security Month 2015: Daily Security Awareness Tips
National Cyber Security Month 2015: Daily Security Awareness Tips October 1 New Threats Are Constantly Being Developed. Protect Your Home Computer and Personal Devices by Automatically Installing OS Updates.
More informationBYOD Policies: A Litigation Perspective
General Counsel Panel Reveals the Real Deal BYOD Policies: A Litigation Perspective By Andrew Hinkes Reprinted with Permission BYOD Policies: A Litigation Perspective By Andrew Hinkes Bring-your-own-device
More informationMobile Devices: Know the RISKS. Take the STEPS. PROTECT AND SECURE Health Information.
Mobile Devices: Know the RISKS. Take the STEPS. PROTECT AND SECURE Health Information. Mobile Devices: Risks to Health Information Risks vary based on the mobile device and its use. Some risks include:
More informationDon t Let A Security Breach Put You Out of Business
Don t Let A Security Breach Put You Out of Business Committed to providing you with the most innovative security and privacy solutions. www.boomtechit.com Bring Your Own Device (BYOD) and Mobile Device
More informationGlobal IT Security Risks: 2012
Global IT Security Risks: 2012 Kaspersky Lab is a leading developer of secure content and threat management solutions and was recently named a Leader in the Gartner Magic Quadrant for Endpoint Protection
More informationSetting BYOD Policy: A New Partnership for IT and HR
Introduction As the line between office and home life continues to blur, employees increasingly rely on their own smartphones, tablets, and laptop computers for work-related tasks. Today, more than 70
More informationKaspersky Security for Mobile
Kaspersky Security for Mobile See. Control. Protect. MOVING TARGETS Mobile devices play a key role in connectivity and productivity. But they also introduce new risks to the business: in the past 12 months
More informationSECURING TODAY S MOBILE WORKFORCE
WHITE PAPER SECURING TODAY S MOBILE WORKFORCE Connect, Secure, and Manage Mobile Devices and Users with Junos Pulse and the Junos Pulse Mobile Security Suite Copyright 2011, Juniper Networks, Inc. Table
More informationEmerging threats for the healthcare industry: The BYOD. By Luca Sambucci www.deepsecurity.us
Emerging threats for the healthcare industry: The BYOD Revolution By Luca Sambucci www.deepsecurity.us Copyright 2013 Emerging threats for the healthcare industry: The BYOD REVOLUTION Copyright 2013 Luca
More informationHot Topics in IT Security PREP#28 May 1, 2014. David Woska, Ph.D. OCIO Security
Hot Topics in IT Security PREP#28 May 1, 2014 David Woska, Ph.D. OCIO Security CME Disclosure Statement The North Shore LIJ Health System adheres to the ACCME s new Standards for Commercial Support. Any
More informationSamsung Mobile Security
Samsung Mobile Security offering enhanced core capabilities for enterprise mobility Samsung Enterprise Mobility Enterprise-ready Mobility management for your business Samsung Mobile Security offers enterprise
More informationHow To Handle A Bring Your Own Device (Byod) In A Business
page 2 Consumers soon found that the devices they used in their personal lives could also be used in their professional lives. They could access not only the internet, but their business network as well.
More informationSetting BYOD Policy: A New Partnership for IT and HR
Introduction As the line between office and home life continues to blur, employees increasingly rely on their own smartphones, tablets, and laptop computers for work-related tasks. Today, more than 70
More informationUse Bring-Your-Own-Device Programs Securely
Use Bring-Your-Own-Device Programs Securely By Dale Gonzalez December 2012 Bring-your-own-device (BYOD) programs, which allow employees to use their personal smartphones, tablets and laptops in and out
More informationCyber Security. An Executive Imperative for Business Owners. 77 Westport Plaza, St. Louis, MO 63416 p 314.439.4700 f 314.439.4799
Cyber Security An Executive Imperative for Business Owners SSE Network Services www.ssenetwork.com 77 Westport Plaza, St. Louis, MO 63416 p 314.439.4700 f 314.439.4799 Pretecht SM by SSE predicts and remedies
More informationNorth Carolina Health Information Management Association February 20, 2013 Chris Apgar, CISSP
Mobile Device Management Risky Business in Healthcare North Carolina Health Information Management Association February 20, 2013 Chris Apgar, CISSP Agenda HIPAA/HITECH & Mobile Devices Breaches Federal
More informationYOUR DATA UNDER SIEGE. PROTECTION IN THE AGE OF BYODS. With Kaspersky, now you can. kaspersky.com/business Be Ready for What s Next
YOUR DATA UNDER SIEGE. PROTECTION IN THE AGE OF BYODS. With Kaspersky, now you can. kaspersky.com/business Be Ready for What s Next Your Data Under Siege. Protection in the Age of BYODs 1.0 As the workplace
More informationWindows Phone 8.1 in the Enterprise
Windows Phone 8.1 in the Enterprise Version 1.4 MobileIron 415 East Middlefield Road Mountain View, CA 94043 USA Tel. +1.650.919.8100 Fax +1.650.919.8006 info@mobileiron.com Introduction 3 Why Windows
More informationSecurity survey in the United States
Security survey in the United States This document contains the results of a survey on network security in 455 small and medium sized businesses, conducted in the United States in October/November 2007.
More informationBYOD Policy for [AGENCY]
BYOD Policy for [AGENCY] This document provides policies, standards, and rules of behavior for the use of smartphones, tablets and/or other devices ( Device ) owned by [AGENCY] employees personally (herein
More informationPOLICY NO. 3.14 September 8, 2015 TITLE: INTERNET AND EMAIL USE POLICY
POLICY NO. 3.14 September 8, 2015 TITLE: INTERNET AND EMAIL USE POLICY POLICY STATEMENT: Many of our employees have access to the internet as well as email capabilities. The County recognizes that these
More informationInformation Technology Acceptable Use Policies
White Paper: Information Technology Acceptable Use Policies A practical guide for protecting IT assets from the largest single IT Security threat inappropriate use of IT services, including desktops, email,
More informationDISCOVER, MONITOR AND PROTECT YOUR SENSITIVE INFORMATION Symantec Data Loss Prevention. symantec.com
DISCOVER, MONITOR AND PROTECT YOUR SENSITIVE INFORMATION Symantec Data Loss Prevention symantec.com One of the interesting things we ve found is that a lot of the activity you d expect to be malicious
More informationWhite Paper: The Current State of BYOD
CTOlabs.com White Paper: The Current State of BYOD May 2012 A White Paper providing context and guidance you can use Inside: Snapshot of a fast moving trend Summary of recent surveys Considerations for
More information10 best practice suggestions for common smartphone threats
10 best practice suggestions for common smartphone threats Jeff R Fawcett Dell SecureWorks Security Practice Executive M Brandon Swain Dell SecureWorks Security Practice Executive When using your Bluetooth
More informationDECISION MAKER S GUIDE: DEVELOPING A BRING YOUR OWN DEVICE STRATEGY
GUIDE DECISION MAKER S GUIDE: DEVELOPING A BRING YOUR OWN DEVICE STRATEGY Giving you a head start in successfully developing and supporting the right BYOD strategy for your organisation TRANSFORMING COMMUNICATIONS
More informationMobility, Security Concerns, and Avoidance
By Jorge García, Technology Evaluation Centers Technology Evaluation Centers Mobile Challenges: An Overview Data drives business today, as IT managers and security executives face enormous pressure to
More informationKeep Calm and Bring Your Own DEVICE. White paper
Keep Calm and Bring Your Own DEVICE White paper Keep Calm and Bring Your Own How a cooperative and self-sealing technology ecosystem makes it safer to BYOD Executive Summary The consumerization of IT and
More informationSecuring Health Data in a BYOD World
BUSINESS WHITE PAPER Securing Health Data in a BYOD World Five strategies to minimize risk Securing Health Data in a BYOD World Table of Contents 2 Introduction 3 BYOD adoption drivers 4 BYOD security
More informationGlobal Corporate IT Security Risks: 2013
Global Corporate IT Security Risks: 2013 May 2013 For Kaspersky Lab, the world s largest private developer of advanced security solutions for home users and corporate IT infrastructures, meeting the needs
More informationConducting a Risk Assessment for Mobile Devices
Conducting a Assessment for Mobile Devices May 9, 2012 David Frei Director, Digital/Information Security Specialist The Changing Environment Today s Discussion Available Industry Assessment Models Unique
More informationPHI- Protected Health Information
HIPAA Policy 2014 The Health Insurance Portability and Accountability Act is a federal law that protects the privacy and security of patients health information and grants certain rights to patients. Clarkson
More informationSecurity Breaches. There are unscrupulous individuals, like identity thieves, who want your information to commit fraud.
IDENTITY THEFT Security Breaches Our economy generates an enormous amount of data. Most users of that information are from honest businesses - getting and giving legitimate information. Despite the benefits
More informationBYOD AND ME. How cell phone hacking effects your business.! Richard Rigby CEO Wraith Intelligence
BYOD AND ME How cell phone hacking effects your business! Richard Rigby CEO Wraith Intelligence 90% of companies will offer BYOD, or bring-your-own-device options to employees by 2014, according to Gartner.
More informationoverview Enterprise Security Solutions
Enterprise Security Solutions overview For more than 25 years, Trend Micro has innovated constantly to keep our customers ahead of an ever-evolving IT threat landscape. It s how we got to be the world
More informationEnterprise Cybersecurity Best Practices Part Number MAN-00363 Revision 006
Enterprise Cybersecurity Best Practices Part Number MAN-00363 Revision 006 April 2013 Hologic and the Hologic Logo are trademarks or registered trademarks of Hologic, Inc. Microsoft, Active Directory,
More information10 Quick Tips to Mobile Security
10 Quick Tips to Mobile Security 10 Quick Tips to Mobile Security contents 03 Introduction 05 Mobile Threats and Consequences 06 Important Mobile Statistics 07 Top 10 Mobile Safety Tips 19 Resources 22
More informationTop 10 Tips to Keep Your Small Business Safe
Securing Your Web World Top 10 Tips to Keep Your Small Business Safe Protecting your business against the latest Web threats has become an incredibly complicated task. The consequences of external attacks,
More informationThe Key to Secure Online Financial Transactions
Transaction Security The Key to Secure Online Financial Transactions Transferring money, shopping, or paying debts online is no longer a novelty. These days, it s just one of many daily occurrences on
More informationA 5-STEP PLAN TO PREPARE FOR HEALTHCARE. A Complimentary White Paper from
A 5-STEP PLAN TO PREPARE FOR BYOD IN HEALTHCARE A Complimentary White Paper from A 5-step plan to prepare for BYOD in health care A Complimentary White Paper from Healthcare Business & Technology Nearly
More informationA LEGAL PERSPECTIVE OF BYOD Building Awareness to Enable BYOD and Mitigate Its Risks. By Michael Finneran and Jim Brashear January 2014
A LEGAL PERSPECTIVE OF BYOD Building Awareness to Enable BYOD and Mitigate Its Risks By Michael Finneran and Jim Brashear January 2014 What to Consider In managing the Bring-Your-Own-Device (BYOD) strategy
More informationBuilding a Business Case:
Building a Business Case: Cloud-Based Security for Small and Medium-Size Businesses table of contents + Key Business Drivers... 3... 4... 6 A TechTarget White Paper brought to you by Investing in IT security
More informationMobile Devices in the Workplace: What Every Employer Needs to Know
Mobile Devices in the Workplace: What Every Employer Needs to Know Presented by: Shannon Huygens Paliotta Senior Associate, Littler Mendelson, P.C. spaliotta@littler.com (412) 201-7631 Marcy McGovern Knowledge
More informationHow To Protect Your Mobile Devices From Security Threats
Back to the Future: Securing your Unwired Enterprise By Manoj Kumar Kunta, Global Practice Leader - Security Back to the Future: Securing your Unwired Enterprise The advent of smartphones and tablets has
More informationMitigating Bring Your Own Device (BYOD) Risk for Organisations
Mitigating Bring Your Own Device (BYOD) Risk for Organisations Harness the benefits and mitigate the risks of BYOD espiongroup.com Executive Summary Mobile devices such as smart phones, tablets, or laptops
More informationSecurity, privacy, and incident response issues are often
ISSA DEVELOPING AND CONNECTING CYBERSECURITY LEADERS GLOBALLY The Legal Implications of BYOD: Preparing Personal Device Use Policies By David Navetta, Esq. ISSA member, Denver, USA Chapter This article
More informationBYOD: Should Convenience Trump Security? Francis Tam, Partner Kevin Villanueva, Senior Manager
BYOD: Should Convenience Trump Security? Francis Tam, Partner Kevin Villanueva, Senior Manager 1 AGENDA Mobile Explosion Mobile Trends BYOD Benefits, Challenges and Threats BYOD Security BYOD Strategy
More informationIowa Health Information Network (IHIN) Security Incident Response Plan
Iowa Health Information Network (IHIN) Security Incident Response Plan I. Scope This plan identifies the responsible parties and action steps to be taken in response to Security Incidents. IHIN Security
More informationControl Issues and Mobile Devices
Control Issues and Mobile Devices ACC 626 Term Paper Ramandip Kaur June 27, 2014 Page Table of Contents Executive Summary...ii 1.0 Introduction... 1 2.0 Current Trends... 1 2.1 Employee Owned Devices and
More information1. For each of the 25 questions, multiply each question response risk value (1-5) by the number of times it was chosen by the survey takers.
Employee Security Awareness Survey Trenton Bond trent.bond@gmail.com Admin - Version 1.3 Security Awareness One of the most significant security risks that organizations and corporations face today is
More informationIT TRENDS AND FUTURE CONSIDERATIONS. Paul Rainbow CPA, CISA, CIA, CISSP, CTGA
IT TRENDS AND FUTURE CONSIDERATIONS Paul Rainbow CPA, CISA, CIA, CISSP, CTGA AGENDA BYOD Cloud Computing PCI Fraud Internet Banking Questions The Mobile Explosion Mobile traffic data in 2011 was nearly
More informationFive Trends to Track in E-Commerce Fraud
Five Trends to Track in E-Commerce Fraud Fraud is nothing new if you re in the e-commerce business you probably have a baseline level of fraud losses due to stolen credit cards, return fraud and other
More informationTHE SECURITY OF HOSTED EXCHANGE FOR SMBs
THE SECURITY OF HOSTED EXCHANGE FOR SMBs In the interest of security and cost-efficiency, many businesses are turning to hosted Microsoft Exchange for the scalability, ease of use and accessibility available
More informationCOMMONWEALTH OF PENNSYLVANIA DEPARTMENT S OF PUBLIC WELFARE, INSURANCE AND AGING
COMMONWEALTH OF PENNSYLVANIA DEPARTMENT S OF PUBLIC WELFARE, INSURANCE AND AGING INFORMATION TECHNOLOGY STANDARD Name Of Standard: Mobile Device Standard Domain: Security Date Issued: 09/07/2012 Date Revised:
More informationUse of Mobile Apps in the Workplace:
Use of Mobile Apps in the Workplace: PRIVACY & SECURITY ADAM D.H. GRANT AGRANT@ALPERTBARR.COM Cell Phone & Tablet Ownership 91% of American adults own a cell phone 56% have smartphones Of Americans aged
More informationoverview Enterprise Security Solutions
Enterprise Security Solutions overview For more than 25 years, Trend Micro has innovated constantly to keep our customers ahead of an ever-evolving IT threat landscape. It s how we got to be the world
More informationMarlon R Clarke, Ph. D., CISSP, CISM Director Network Operations and Services, NSU 10-17-2013
Marlon R Clarke, Ph. D., CISSP, CISM Director Network Operations and Services, NSU 10-17-2013 Todays Discussion Overview of Computer and Internet Security What is Computer and Internet Security Who Should
More informationBYOD: Bring Your Own Device Advantage, Liability or Both?
BYOD: Bring Your Own Device Advantage, Liability or Both? S S Scott Summers Laura B. Grubbs Dinsmore & Shohl Louisville, KY The BYOD to Work Movement Dual-Use Devices: used for both personal and company
More information