BYOD Risks & Rewards

How to keep employee smartphones, laptops
and tablets secure

< Prev 1 | 2 | 3 | 4 | 5 Next >

What is BYOS

The same technologies driving the turn to BYOD also allow users to access non-company software. This effect is known as Bring Your Own Software (BYOS).

End users may be using free public cloud storage providers as way to collaborate on and transfer large documents. Those documents, however, could contain data that falls into scope of regulatory guidelines, which could place your data at risk.

You should evaluate how cloud storage providers transport and store your company’s files.

Consider these questions:

  1. How are they encrypting the data?
  2. Are they using a single key for all of their customers?
  3. Who has access to the key to decrypt the data?
  4. Will they surrender the data to authorities if it is subpoenaed?
  5. In which countries are the servers located that are housing the data?
  6. Does your organization have an agreement with customers that their data won’t be stored in certain countries?

To learn more about cloud storage and your security, download the whitepaper Fixing Your Dropbox Problem at

Go to next page: How to secure BYODs

Sophos solutions

Sophos Mobile Control Sophos Mobile Control
See how we can protect BYODs

We also offer a free Android malware scanner. It scans all your Android apps for malware and protects against loss and theft with a remote lock feature. Start protecting your Android device today.

Security Gets Personal

Complete security, licensed by the user—not the device

Learn more