List Headline Image
Updated by Ray Horan on Jun 19, 2014
Headline for 13 Tips for BYOD Security
 REPORT
Ray Horan Ray Horan
Owner
13 items   3 followers   0 votes   117 views

13 Tips for BYOD Security

How to avoid the major security concerns associated with BYOD.

Source: http://go.christiansteven.com/blog/bid/277907/Tips-for-Securely-Using-Mobile-Devices-at-Work

1

Using strong passwords on devices.

Using strong passwords on devices.
2

Use encryption to safely secure data.

Use encryption to safely secure data.
3

Ensure access to the device is locked or data is automatically deleted if an incorrect password is entered too often.

Ensure access to the device is locked or data is automatically deleted if an incorrect password is entered too often.
4

Automatically lock the device if it has been inactive for a set period of time.

Automatically lock the device if it has been inactive for a set period of time.
5

Make sure users know exactly which data could be deleted automatically or remotely.

Make sure users know exactly which data could be deleted automatically or remotely.
6

Maintain a clear differentiation between personal and business data by using different apps for both.

Maintain a clear differentiation between personal and business data by using different apps for both.
7

Transfer all data via encrypted channels.

Transfer all data via encrypted channels.
8

Use cloud-based sharing and public backup systems with extreme caution.

Use cloud-based sharing and public backup systems with extreme caution.
9

Take care that monitoring technology remains proportionate and not excessive, especially during personal use.

Take care that monitoring technology remains proportionate and not excessive, especially during personal use.
10

Register devices with a remote locate and delete facility.

Register devices with a remote locate and delete facility.
11

Have a process in place for quickly and effectively revoking access to a device in the event of loss or theft.

Have a process in place for quickly and effectively revoking access to a device in the event of loss or theft.
12

Limit the choice of devices to those which you have assessed as providing an appropriate level of security.

Limit the choice of devices to those which you have assessed as providing an appropriate level of security.
13

Provide guidance to users about the risks of downloading untrusted or unverified apps.

Provide guidance to users about the risks of downloading untrusted or unverified apps.