สรุป
แนวทางการจัดการเรื่อง
BYOD (Bring Your Own Device) ที่เปิดโอกาสให้พนักงานใช้มือถือหรือเครื่องส่วนตัวในเรื่องงานได้
ภายใต้กรอบของความปลอดภัยและไม่ก้าวก่ายความเป็นส่วนตัวของพนักงาน
1. Define Your BYOD
Policy
2. Keep Your Policy
“Evergreen”
3. Use VoIP Apps for
Business Calls
4. Create Restrictions
on Saved Company Data
5. Require Device Updates
6. Include BYOD in Your
Offboarding Process
Summary
Mobile devices make up about 60% of the
endpoints in a company network. But they’re often neglected when it comes to
strong cybersecurity measures.
This is especially true with employee-owned mobile devices. You can run BYOD securely if you have some best practices in place.
1. Define Your BYOD Policy
2. Keep Your Policy “Evergreen”
3. Use VoIP Apps for Business Calls
4. Create Restrictions on Saved Company Data
5. Require Device Updates
6. Include BYOD in Your Offboarding Process
BYOD (bring your own device) is a
concept that took hold after the invention of the smartphone. When phones got
smarter, software developers began creating apps for those phones. Over time,
mobile device use has overtaken desktop use at work. According to Microsoft,
mobile devices make up about 60% of the endpoints in a company network. They also handle about 80% of the
workload. But they’re often neglected when it comes to strong cybersecurity
measures. This is especially true with employee-owned mobile devices. BYOD
differs from corporate-owned mobile use programs. Instead of using company
tools, employees are using their personal devices for work. Many businesses
find this the most economical way to keep their teams productive.
Purchasing phones and wireless plans for staff is often out of
reach financially. It can also be a pain for employees to carry around two
devices, personal and work. It’s estimated that 83% of
companies have a BYOD policy. You can run BYOD securely if you have
some best practices in place. Too often, business owners don’t know all the
devices connecting to business data. Or which ones may have data stored on
them. Here are some tips to overcome the security and challenges of BYOD. These
should help you enjoy a win-win situation for employees and the business.
If there are no defined rules for BYOD, then you can’t expect the
process to be secure. Employees may leave business data unprotected. Or they
may connect to public Wi-Fi and then enter their business email password,
exposing it. You need a policy if you allow employees to access business data
from personal devices. This policy protects the company from unnecessary risk.
It can also lay out specifics that reduce potential problems—for example,
detailing the compensation for employees that use personal devices for work.
A policy becomes less relevant to employees as soon as it becomes
outdated. Someone may look at your BYOD policy and note that one directive is
old. Because of that, they may think they should ignore the entire policy. Make
sure that you keep your BYOD policy “evergreen.” This means updating it
regularly if any changes impact those policies.
Before the pandemic, 65% of employees gave their phone numbers to
customers. This often happens due to the need to connect with a client when
away from an office phone. Clients also may save a personal number for a staff
member. For example, when the employee calls the customer from their device.
Customers having an employee’s number is a problem for everyone. Employees may
leave the company and no longer answer those calls. You can avoid the issue by
using a business VoIP phone system. These services have mobile apps that
employees can use. VoIP mobile apps allow employees to make and receive calls
through a business number.
Remote work has exasperated the security issue with BYOD. While
BYOD may have meant mobile devices in the past, it now means computers too.
Remote employees often will use their PCs when working outside the office. No
matter the device type, you should maintain control of business data. It’s a
good idea to restrict the types of data that staff can store on personal
devices. You should also ensure that it’s backed up from those devices.
When employee devices are not updated or patched, they invite a
data breach. Any endpoint connected to your network can enable a breach. This
includes those owned by employees. It can be tricky to ensure that a device
owned by an employee is kept updated. Therefore, many businesses turn to
endpoint management solutions. An endpoint device manager can push through
automated updates. It also allows you to protect business data without
intruding on employee privacy. The monitoring and management capabilities of
these tools improve security. This includes the ability to safelist devices.
Safelists can block devices not added to the endpoint manager.
If an employee leaves your company, you must clean their digital
trail. For example, is the employee still receiving work email on their phone?
Do they have access to company data through persistent logins? Are any saved
company passwords on their device? These are all questions to ask when
offboarding a former staff member. You should also copy and remove any company
files on their device. Additionally, ensure that you deauthorize their
device(s) from your network.