April 2, 2019

Challenges of BYOD

The advent of technology has brought tremendous convenience in our ability to access data for personal and business needs. BYOD (Bring Your Own Device) is often a requirement to conduct business in situations where contractors, consultants and personnel from other offices are collaborating. The need for outside personnel to access corporate networks and intellectual property is often key to successfully achieving goals and completing projects.


This convenience is double-edged in that it has also introduced many security concerns on both the individual and corporate level. Allowing external personnel to access company networks and devices brings an increased need for vigilance against many potential security violations. The damage caused by malware is in the billions of dollars annually worldwide.

Dangers of Bringing Your Own Device

 

  1. Untrained Users: Phishing attacks are the root of 91% of all security breaches, which means that the easiest way for a hacker to access a company’s network is being allowed in with the help of an unwitting accomplice. It is imperative to ensure personnel that are bringing their own device are aware of phishing attacks, proper maintenance of their devices and the importance of software and OS updates.
  2. Increased exposure to viruses and malware caused by poor maintenance of personal (and professional) devices: With the rise in ransomware and cryptocurrency mining viruses, it is extremely important that all external computers have robust antivirus software that is up to date and active. Outdated antivirus, or antivirus that is not actively running, is akin to having a sleeping or absent security guard.
  3. Unlocked devices: All devices that have been unlocked (also called jailbroken or rooted) are inherently unsafe as the basic security safeguards have been eliminated to unlock the device. These devices (usually smartphones) should never be allowed to access corporate resources, including email.
  4. Poor planning and policies: A lack of planning or foresight by a company’s IT department is a huge detriment when enacting BYOD as this inherently opens up a network to increased attacks. Without proper planning and policies there is a gap in your company’s armor that can easily be exploited.
  5. Data leaks: There is an enormous risk to a company’s Intellectual Property when it walks out the door on an employee’s device. Securing company data is vital to staying ahead of the competition, and this advantage can easily be lost if IP is leaked on a poorly secured computer or smartphone.
  6. Lost devices: A lost smartphone or computer without proper security and encryption can easily be accessed by anyone with some know-how and the proper motivation.
  7. Mixing business/personal use on devices: Mixing business and personal use on a computer is a bad practice. Whereas this is fairly common on smartphones (hence the need for a properly secured phone) this is multiplied on a computer as PCs tend to have larger capacity hard drives, access to network drives and have more complexity that most users ignore. Additionally, many users rarely consider the implications of storing personal data (music, tax returns, etc) on a company computer.

At iTecs, we secure networks based on a company’s culture and preferred level of security; however, we prefer to follow best IT practices. iTecs believes that devices that are not managed by our team of network administrators and technicians should never be allowed to access your business’s network. If your company is in need of qualified IT security professionals, or if you simply want to consult and verify your corporate IT security infrastructure, please contact us.

Latest Posts

February 3, 2022

The Rise of SMS Phishing

After what seems like a lifetime of technology exposure, I still become saddened but not surprised when I hear about someone falling victim to a phishing attack. Most medium to large businesses, if not all, have invested heavily in employee awareness training as a means to improve their cybersecurity posture.

Read More
December 17, 2021

iTecs Enters Into A Partnership With Check Point

iTecs enters into a partnership with Check Point, a leader in enterprise and SMB cybersecurity products and solutions, to provide iTecs clients with efficacious cybersecurity protection. The collaboration between the two parties enables iTecs to deliver the various services and products to clients as a managed service.

Read More
September 8, 2021

How To Protect Crypto Exchange Accounts

Mitigate the chances that your crypto exchange accounts get hacked by following the tips below.‍You may have read articles of families losing their entire online Exchange accounts balances due to hackers breaching and stealing everything they own. Some of you may believe that the responsibility of these hacks is on the Exchanges, and I'm here to tell you this is usually not the case. Before you get angry, let me first explain the two types of hacks that occur that lead to you losing your entire investment.

Read More

You have questions, we have answers

What can we help you with?