Keep it together: BYOD security for beginners

Keep it together: BYOD security for beginners

The bring your own device trend has provided many companies with opportunities to capture the productivity and efficiency-driving power of smartphones, tablets and portable computers. If businesses allow employees to use the devices they choose and purchase on their own, IT expenditures can be directed in alternative directions, leading to more robust frameworks that are created much more rapidly than would have been possible only a decade ago. 

However, when it comes to BYOD management, it is not all cookies and ice cream for the average business owner, as the security risks and potential vulnerabilities that come along with personal device use are very real. Leaders must ensure that they are taking targeted, proactive steps toward securing BYOD devices, applications and in-house corporate infrastructure for the most positive outcomes down the road. 

Proper trashing practices
Sims Recycling Solutions, which specializes in the reuse and recycling of electronic devices, recently released an infographic that highlighted some of the more important aspects of BYOD policymaking as they relate to security. While one might wonder why a firm that specializes in these practices might be interested in security, the person should remember that the most significant and common threat of BYOD is a lost or stolen device. 

"There are understandably many organizations which may hesitate to adopt a BYOD policy, but as organizations move in this direction, more companies may choose to employ this in the hope that it will keep them competitive and create a positive and productive atmosphere for employees," Sims Recycling Solutions President Steve Skurnac explained.

The main focus of this communication was the creation of policies that will include some form of guidance on the disposal of old IT assets, including personal devices that were used for work functions. Above all else, the main takeaway is to ensure that security policies are comprehensive, spanning from the inception of a new device to its eventual replacement and disposal. 

Applications in UC
Similarly, other equipment used within a unified communications strategy can represent risk when not disposed of properly at the end of their lifecycles. As such, companies should work with their vendors and managed service providers to ensure that all assets are properly destroyed when they are no longer in use, especially those that are used to transmit sensitive data. 

Businesses that create the most progressive policies and strategies will often enjoy the fewest security hiccups and most optimized approach to technology provisioning over time.