With news of security threats to smartphones growing, does a Bring Your Own Device to Work (BYOD) policy still make sense? The Android operating system’s popularity among consumers has also made it an attractive target for cyber criminals. It makes it likely that a BYOD policy with no restrictions will lead employees to bring Android devices and malware with security risks to work.
The most recent example of attacks on Google’s mobile operating system includes a spammer who has control of a botnet that spreads through Android devices. This botnet enables hackers to take control of victims’ smartphones and use their e-mail accounts to send spam. While individuals may be able to simply apologize for any spam that comes from their e-mail accounts, businesses are held to a higher standard. In many cases, they can be assessed for damages and other penalties for failing to take adequate security precautions. In addition, bad publicity over security breaches may lead customers to worry about doing business with a firm that fails to protect its customers.
These examples highlight important differences in the expectations that people have for the types of security that businesses will have compared to consumers. These differences are relevant for your evaluation of a BYOD policy. It is important to remember that smartphones provide employees with access to corporate assets beyond voice services and e-mail. It may corporate software, intellectual property, financial records, customer data and other items.
Finding the right mix of mobility services for your organization will depend on the types of information and other corporate intellectual property that resides on employees’ smartphones through e-mail, attachments, and other technology. In addition, employees that work away from the office and those that have mission critical roles should have secure devices that are managed by employers. The foundation of any program is a formal policy that establishes the right mix for some BYOD devices and corporate managed devices.
Avotus Mobile Communication Lifecycle Management (MCLM) can help you manage corporate devices with a comprehensive approach and complete visibility into your corporate wireless environment and usage for those mobile devices. Learn how it will ensure that corporate policies are proactively enforced.
Tagged: Smartphone Security, Bring Your Own Device to Work, BYOD, Android operating system, Avotus Mobile Communication Lifecycle Management, MCLM