List Headline Image
Updated by Ray Horan on Jun 19, 2014
Headline for 13 Tips for BYOD Security
 REPORT
Ray Horan Ray Horan
Owner
13 items   3 followers   0 votes   116 views

13 Tips for BYOD Security

How to avoid the major security concerns associated with BYOD.

Source: http://go.christiansteven.com/blog/bid/277907/Tips-for-Securely-Using-Mobile-Devices-at-Work

1

Using strong passwords on devices.

Mar 21, 2013
13 Tips for BYOD Security | Using strong passwords on devices.
2

Use encryption to safely secure data.

Mar 21, 2013
13 Tips for BYOD Security | Use encryption to safely secure data.
3

Ensure access to the device is locked or data is automatically deleted if an incorrect password is entered too often.

Mar 21, 2013
13 Tips for BYOD Security | Ensure access to the device is locked or data is automatically deleted if an incorrect password is entered too often.
4

Automatically lock the device if it has been inactive for a set period of time.

Mar 21, 2013
13 Tips for BYOD Security | Automatically lock the device if it has been inactive for a set period of time.
5

Make sure users know exactly which data could be deleted automatically or remotely.

Mar 21, 2013
13 Tips for BYOD Security | Make sure users know exactly which data could be deleted automatically or remotely.
6

Maintain a clear differentiation between personal and business data by using different apps for both.

Mar 21, 2013
13 Tips for BYOD Security | Maintain a clear differentiation between personal and business data by using different apps for both.
7

Transfer all data via encrypted channels.

Mar 21, 2013
13 Tips for BYOD Security | Transfer all data via encrypted channels.
8

Use cloud-based sharing and public backup systems with extreme caution.

Mar 21, 2013
13 Tips for BYOD Security | Use cloud-based sharing and public backup systems with extreme caution.
9

Take care that monitoring technology remains proportionate and not excessive, especially during personal use.

Mar 21, 2013
13 Tips for BYOD Security | Take care that monitoring technology remains proportionate and not excessive, especially during personal use.
10

Register devices with a remote locate and delete facility.

Mar 21, 2013
13 Tips for BYOD Security | Register devices with a remote locate and delete facility.
11

Have a process in place for quickly and effectively revoking access to a device in the event of loss or theft.

Mar 21, 2013
13 Tips for BYOD Security | Have a process in place for quickly and effectively revoking access to a device in the event of loss or theft.
12

Limit the choice of devices to those which you have assessed as providing an appropriate level of security.

Mar 21, 2013
13 Tips for BYOD Security | Limit the choice of devices to those which you have assessed as providing an appropriate level of security.
13

Provide guidance to users about the risks of downloading untrusted or unverified apps.

Mar 21, 2013
13 Tips for BYOD Security | Provide guidance to users about the risks of downloading untrusted or unverified apps.