Mobile Device Security in a BYOD World

By
Services for Real Estate Pros with IDTheftSecurity.com Inc

In the real world there is little difference between an employer’s issued device and a personal mobile device. The most important difference should be that a digital device issued by your employer requires and should have a “company mobile liability policy”. Businesses generally provide and pay for employee mobile devices, and also strictly dictate what you can or cannot do on the device. For IT security reasons, the employer may have remote capabilities to monitor activity and in the event of loss or employee termination wipe the data.

Mobile device security policies” are for the BYOD or “Bring Your Own Device” employees. The employee may pay for the device and its monthly plan and has also imposed security restrictions and limitations on employees who use their personal devices at work. If you choose to use your personal device for employment purposes at any time for any reason then your employer may take control over that device to protect themselves. In a company mobile liability policy, the employer often has remote capabilities to monitor activity and in the event of loss or employee termination wipe the data.

A recent study shows less than 10% of people BYOD employees auto lock their tablets and people were more security-savvy about their smartphones, with 25% locking.

Most employee issued mobile management software will require the device to be locked and the password to be changed quarterly. These mobile device security programs tell you in the terms and conditions that the contents on the device is subject to being monitored and at any time the device can be wiped by the employer.

The employer is liable for potentially lost data on your mobile. So, to maintain security in a BYOD world, plan on giving up some liberties.

Robert Siciliano personal and small business security specialist toADT Small Business Security discussing ADT Pulse on Fox News. Disclosures

close

This entry hasn't been re-blogged:

Re-Blogged By Re-Blogged At
Tags:
mobile device

Anonymous
Post a Comment
Spam prevention

Accessibility option: listen to a question and answer it!

To submit the form,
drag the tree to the circle on the side.

Type below the answer to what you hear. Numbers or words, lowercase:

Spam prevention

Accessibility option: listen to a question and answer it!

To submit the form,
drag the lamp to the circle on the side.

Type below the answer to what you hear. Numbers or words, lowercase:

Anonymous
Post a Comment
Spam prevention

Accessibility option: listen to a question and answer it!

To submit the form,
drag the tshirt to the circle on the side.

Type below the answer to what you hear. Numbers or words, lowercase:

Rainmaker
420,278

Robert Siciliano

Realty Security and Identity Theft Expert Speaker
Ping me to book a program for your group
*
*
*
Spam prevention

Accessibility option: listen to a question and answer it!

To submit the form,
drag the camera to the circle on the side.

Type below the answer to what you hear. Numbers or words, lowercase: