SoSecure November: is your BYOD policy secure?
SoConnect | Part of Air IT
A seamlessly connected workforce is a productive workforce. Give your team a modern, managed IT infrastructure.
It's been another busy month for the SoConnect team. This time of year always sees a flurry of activity before thoughts turn to Christmas and the new year. But always remember, the hackers are busy too. Never drop your guard.?
In this edition of the SoSecure Crew newsletter, William tells you how to have a secure BYOD policy, and Nico highlights a security risk you might have missed. We also have some exciting news to share: we've moved, and you can see the very first pictures of our shiny new office!??
What are the risks in your BYOD policy??
We asked our Technical Engineer, William Davidson , for his advice on building a BYOD policy.?
A BYOD policy allows employees to work with their own devices, such as laptops, smartphones and tablets. This is becoming increasingly common for companies, but it can pose several security risks.
Your IT team has less control over personal devices. That means more security responsibility falls into the user's hands. Without proper upkeep, a BYOD device can quickly fall behind with security updates, become more easily infected with malware, and allow viruses to spread around the entire company network - which could result in a costly data breach.?
But it's not all bad news - there is still a way to get all the advantages of a BYOD policy with a minimal security risk.?One way is to publish guidance to ensure everyone takes the necessary steps to secure devices and data.
Here's what it should include;
If you want further peace of mind, you should look at software such as Microsoft Intune. Intune is enterprise security and management for PCs, mobile devices and apps. It supports 'bring your own' devices (BYOD) by allowing users to enrol. Intune configures app settings, tracks app usage, and when needed, removes business data from company and personal devices. It also offers additional security with app protection policies. This includes removing access and isolating company data on devices.
Find out more about?Microsoft Intune.
领英推荐
Remote access computer software
Remote access software can be a handy application for getting device support from external sources. Many SMEs have used software so that technicians and experts can take control of their machines. While these applications do not pose a security risk themselves, there are sneaky ways that hackers could get in.?
Technical Team Lead, Nico Vermeulen , has the following advice:
"If you use remote access apps, don't leave them in 'unattended' mode or similar. It leaves you wide open to scammers who can easily guess the code and gain unfettered access to your machine! "
Remote access software needs to be easy to use. That means that credentials are usually easy to dictate over the phone or put into a message. However, uncomplicated credentials are generally easy to guess and are prone to leaking. Once a hacker has them, they have full access to your company data.?
Here's how to keep safe:
New office?
We outgrew our Castle Street office. So we went on the hunt for a new office to accommodate our growing Edinburgh team. A space where we could work, laugh and create together. And we found it. Last week we moved into our new office space at Apex Hotels House in Sighthill. Look at the lovely welcome basket from our fantastic new landlords!
It's a work in progress while we make it feel like home. Stay tuned for a big reveal coming soon.?