List Headline Image
Updated by Ray Horan on Jun 19, 2014
Headline for 13 Tips for BYOD Security
 REPORT
Ray Horan Ray Horan
Owner
13 items   3 followers   0 votes   117 views

13 Tips for BYOD Security

How to avoid the major security concerns associated with BYOD.

Source: http://go.christiansteven.com/blog/bid/277907/Tips-for-Securely-Using-Mobile-Devices-at-Work

1

Using strong passwords on devices.

Mar 21, 2013
Using strong passwords on devices.
2

Use encryption to safely secure data.

Mar 21, 2013
Use encryption to safely secure data.
3

Ensure access to the device is locked or data is automatically deleted if an incorrect password is entered too often.

Mar 21, 2013
Ensure access to the device is locked or data is automatically deleted if an incorrect password is entered too often.
4

Automatically lock the device if it has been inactive for a set period of time.

Mar 21, 2013
Automatically lock the device if it has been inactive for a set period of time.
5

Make sure users know exactly which data could be deleted automatically or remotely.

Mar 21, 2013
Make sure users know exactly which data could be deleted automatically or remotely.
6

Maintain a clear differentiation between personal and business data by using different apps for both.

Mar 21, 2013
Maintain a clear differentiation between personal and business data by using different apps for both.
7

Transfer all data via encrypted channels.

Mar 21, 2013
Transfer all data via encrypted channels.
8

Use cloud-based sharing and public backup systems with extreme caution.

Mar 21, 2013
Use cloud-based sharing and public backup systems with extreme caution.
9

Take care that monitoring technology remains proportionate and not excessive, especially during personal use.

Mar 21, 2013
Take care that monitoring technology remains proportionate and not excessive, especially during personal use.
10

Register devices with a remote locate and delete facility.

Mar 21, 2013
Register devices with a remote locate and delete facility.
11

Have a process in place for quickly and effectively revoking access to a device in the event of loss or theft.

Mar 21, 2013
Have a process in place for quickly and effectively revoking access to a device in the event of loss or theft.
12

Limit the choice of devices to those which you have assessed as providing an appropriate level of security.

Mar 21, 2013
Limit the choice of devices to those which you have assessed as providing an appropriate level of security.
13

Provide guidance to users about the risks of downloading untrusted or unverified apps.

Mar 21, 2013
Provide guidance to users about the risks of downloading untrusted or unverified apps.