BYOD Risks & Rewards

How to keep employee smartphones, laptops
and tablets secure

< Prev 2 | 3 | 4 | 5 | 6 Next >

How to set policy and compliance standards

You need to formalize policies specifically around BYOD. For example, will your policy include any and all devices currently available? Or will you limit use of personal devices to specific hardware and software platforms? What about devices that aren’t yet available but could reach consumer markets in the next few years?

The handheld mobile device market is evolving rapidly with new versions and new manufacturers. Keeping that in mind, your BYOD policy should be adaptable. You should maintain written strategic policies based on what you know today and what you think will generally be available tomorrow. And you must apply technology that enforces your written policies to provide management, audit proof modeling, control and security.

Implementing a solution designed to verify that devices can be remotely managed can help you in the ongoing battle to keep security policies relevant and reliable, especially if you’re in an industry with strict compliance and auditing standards.

Additionally, being aware of the service plans your employees have can help you offer the best services while reducing cost. Using a data plan’s hotspot or tethered options can result in an overall better experience for end users. Consider data-only plans for personal Wi-Fi devices in place of maintaining a home office long distance and ISP service plans.

Go to next page: 7 steps to a BYOD security plan

Sophos solutions

Sophos Mobile Control Sophos Mobile Control
See how we can protect BYODs

We also offer a free Android malware scanner. It scans all your Android apps for malware and protects against loss and theft with a remote lock feature. Start protecting your Android device today.

Security Gets Personal

Complete security, licensed by the user—not the device

Learn more