June 24, 2015

How Your Business Can Overcome Its Fear of BYOD

By Vineet Jain

Overcoming BYOD Fear

While the popularity of the remote workforce has been on the rise, more and more people are returning to the office to work out of fear that their business data isn’t secure, according to a Neustar report. A whopping 83 percent of respondents are worried about the security of their files, and 27 percent feel uncomfortable sharing data through emails.

Despite popular belief, the convenience of implementing BYOD practices in enterprise businesses doesn’t have to come at the cost of security or IT control. In fact, there are some simple solutions that can enhance mobility without compromising company data.

Common BYOD Fears

NS-Cloud-Report-Jun15-WW-IG-00-600px

Some of the worst security issues facing mobile app development stem from data breaches and data leaks  — but those are just the tip of the iceberg.

IT professionals worry that employees will be careless with information. Users often don’t understand the potential repercussions of their actions, which can lead to the mishandling of data.

With BYOD, IT also has to maintain full visibility and control over how employees handle company data, what apps they use, and the health of all of the devices. Plus, IT needs to be knowledgeable about every single type of device being used within the organization.

Because of these issues and the mounting number of devices IT has to keep track of, IT’s ultimate fear is that it will lose control and never be able to get it back, leaving the organization vulnerable indefinitely.

But are these fears realistic? In a word, yes. The chances for breaches rise as more mobile devices and apps are used.

In fact, a report from Netskope states that 70 percent of compromised accounts’ are a result of uploads  to apps with poor security. Organizations use about 730 cloud apps, and 90 percent of those aren’t enterprise-ready. With the mobile-first business environment, security issues can’t be taken lightly, which is why IT has become fearful of jumping right into the game.

Implementing BYOD Security Solutions 

Thankfully, there are solutions that can help IT departments better protect their company’s data and mitigate the risks.

First, everyone involved needs to be educated on the dos and don’ts of working with company data. Once IT has set expectations and provided clear guidelines, it can implement added security measures to make its initiatives foolproof. These additional features can include encryption (which should be mandatory), two-factor authentication, and tools such as Sophos, Netskope, Okta, etc.

Naturally, there will be employees who make mistakes, are unsure of certain protocols, or blatantly disregard IT’s instructions. But these employees showcase why added security, visibility, and control are so important.

Another effective solution is creating visibility. If IT has auditing capabilities paired with some form of smart reporting, it can ensure employees are operating in alignment with security protocols when sharing content. For example, if an IT professional sees that an employee shared something that’s being excessively viewed, he may come to the conclusion that the employee mishandled the link and let it go public.

Finally, IT professionals should have the ability to set strict permissions that are granular – right down to a user or file. Some solutions have features that allow IT to remotely wipe devices if they’re lost or stolen. This level of control will give the IT team peace of mind knowing that company data is being handled responsibly.

Balfour Beatty, one of our construction clients, successfully implemented these security measures when adopting a mobile strategy that allows project teams to use mobile devices in the field. The company’s IT department’s visibility allows it to ensure confidential blueprints and company documents aren’t leaked outside of the project team, and its control allows it to remotely wipe information from mobile devices when subcontractors or other workers finish projects or if a device is lost or stolen. This mobile strategy also saved the company over $5 million on paper for one project.

BYOD practices can save money and boost productivity — as long as company data isn’t compromised along the way. While the survey data mentioned above highlighted the fears of working outside of the office, these fears can be eased with the right security measures in place, in addition to enabling efficient mobile work on the go. If IT departments incorporate these data-security practices and implement BYOD policies cautiously and appropriately, they can keep their company’s employees happy without putting business data at risk.

by Vineet Jain

Vineet Jain

Vineet is the CEO and co-founder of Egnyte. Prior to Egnyte, Vineet founded and successfully built Valdero, a supply chain software solution provider, funded by KPCB, MDV and Trinity Ventures. He has held a rich variety of senior operational positions at companies like KPMG, Bechtel, etc. in the past. He has 20 years of experience in building capital-efficient and nimble organizations. Vineet earned a BS in Engineering from Delhi College of Engineering and received an MBA from Santa Clara University.
Mariusz Michalowski

Streamlining Infrastructure Management with Terraform Automation

Streamlining Infrastructure Management The growth of cloud computing and infrastructure as code (IaC) practices has [...]
Read more
Steve Prentice

Episode 19: Why AWS Needs to Become Opinionated about FinOps

On today’s episode of the CloudTweaks podcast, Steve Prentice chats with Rahul Subramaniam, CEO at CloudFix [...]
Read more
Surya Kant Verma

Choosing the Right Cloud Platform: A Guide to Finding Secure, Cost-Efficient Solutions

Choosing the Right Cloud Platform Cloud computing has revolutionized how organizations work, offering an increased [...]
Read more
Randy

Karen Buffo, CMO of MixMode, on the Rise of AI in Safeguarding Digital Assets

Welcome to our Q&A session with Karen Buffo, CMO of MixMode, hosted by CloudTweaks. Today, [...]
Read more
Jeff DeVerter

Charting the Course: An Interview with Rackspace’s Jeff DeVerter on AI and Cloud Innovation

Rackspace’s Jeff DeVerter on AI & Cloud Innovation In an insightful conversation with CloudTweaks, Jeff [...]
Read more
Rakesh Soni

Breaking Barriers with the Cloud: How Computing is Unlocking New Business Horizons

Breaking Barriers with the Cloud The ever-increasing rate of global cloud adoption is enough to [...]
Read more

SPONSOR PARTNER

Explore top-tier education with exclusive savings on online courses from MIT, Oxford, and Harvard through our e-learning sponsor. Elevate your career with world-class knowledge. Start now!
© 2024 CloudTweaks. All rights reserved.