Securing BYOD at the height of the work-from-home era | SC Media
Zero trust

Securing BYOD at the height of the work-from-home era

February 1, 2021
Underscoring the global nature of the pandemic, a Madagascar man works from home on a laptop. Today’s columnist, Darren Guccione of Keeper Security, offers tips for locking down BYOD devices during the work-from-home era. WorldBankPhotoCollection CreativeCommons (Credit: CC BY-NC-ND 2.0)
  • Acceptable use.
  • Any rights the organization may have to alter the device, such as the ability to remotely disable or wipe a stolen device.
  • Security controls, such as password security procedures, the use of encryption for stored data, and VPN usage.
  • Requirements that the employee install certain security apps, such as anti-virus packages or mobile device management (MDM) solutions.
  • Require employees to exercise good password security practices, including the use of strong, unique passwords, multi-factor authentication (MFA), and a password manager.
  • Restrict employees from using rooted devices to access organizational resources. A rooted device (also known as a “jailbroken” device) is an Android phone or tablet that has been unlocked to install unapproved apps, delete unwanted apps, underclock or overclock the processor, or perform other customizations.
  • Prohibit employees from storing organizational data on their personal devices. Doing so violates certain compliance requirements, and it puts  the organization at risk should the device become lost or stolen. About 70 million smartphones are stolen annually, and only 7 percent are recovered.
  • Require employees to enroll BYOD devices for mobile device management.
prestitial ad