Story image

BYOD security: Protect your data before it's too late

23 Jun 2015

With BYOD now a permanent feature of the IT landscape, mobile devices have become the next target for criminals looking to access information and networks illegally. This means it's more important than ever for businesses to have a BYOD data protection policy, according to Acronis.

The need to control IT budgets, ensure productivity and support flexible working hours drives BYOD, with staff bringing in their own smartphones, tablets, and even PCs for business use. 

However, IT teams without a consistent security and backup policy are likely to face mounting concerns as multiple BYOD devices are linked to corporate networks and employees are increasingly accessing data from any place, over any device, says Acronis.

Lincoln Goldsmith, Acronis general manager ANZ, says, “Every single mobile device represents an endpoint where data could be lost, stolen, or compromised.”

Gartner predicts 38% of companies will rely exclusively on BYOD policies by 2016, with 85% of businesses expected to use some form of BYOD program by 2020.

In turn, data breaches will shift to tablets and smartphones by 2017.

To avoid becoming a victim and potentially compromising vital business information, organisations should implement BYOD strategies that prevent unauthorised access to information, Acronis says.

Goldsmith says, “An effective data protection strategy should incorporate a solution that lets IT departments monitor and correct BYOD security situations and disasters remotely, while preventing unauthorised individuals from gaining access to confidential company information. 

“A reliable data protection solution for BYOD environments should also prevent employees from accidentally sharing information with others by implementing permissions and sharing restrictions.

“At all times, you should be able to tell who accessed what information and when.“ 

A BYOD policy can benefit businesses by reducing costs on hardware and improving productivity. For employees, it can lead to better data protection and often improve ease of use for applications.

However, a consistent BYOD data protection policy should strike a sound balance between access and restriction for both employees and employers, according to Acronis.

Slack doubles down on enterprise key management
EKM adds an extra layer of protection so customers can share conversations, files, and data while still meeting their own risk mitigation requirements.
NVIDIA introduces a new breed of high-performance workstations
“Data science is one of the fastest growing fields of computer science and impacts every industry."
Apple says its new iMacs are "pretty freaking powerful"
The company has chosen the tagline “Pretty. Freaking powerful” as the tagline – and it’s not too hard to see why.
NZ ISPs issue open letter to social media giants to discuss censorship
Content sharing platforms have a duty of care to proactively monitor for harmful content, act expeditiously to remove content which is flagged to them as illegal.
Partnership brings AI maths tutor to NZ schools
“AMY can understand why students make a mistake, and then teach them what they need straight away so they don't get stuck."
Polycom & Plantronics rebrand to Poly, a new UC powerhouse
The name change comes after last year’s Plantronics acquisition of Polycom, a deal that was worth US $2 billion.
Unencrypted Gearbest database leaves over 1.5mil shoppers’ records exposed
Depending on the countries and information requirements, the data could give hackers access to online government portals, banking apps, and health insurance records.
Mozilla launches Firefox Send, an encrypted file transfer service
Mozille Firefox has launched a free encrypted file transfer service that allows people to securely share files from any web browser – not just Firefox.