Bay Area IT Support & IT Services

The Intivix Blog

Business IT Articles, News and Tips

How to Embrace BYOD Properly

BYOD (Bring Your Own Device) in the workplace is a trend that is being embraced by both employees and employers. As the cloud is shaping more of the corporate landscape, BYOD is a practical option for most companies. More and more businesses are allowing their workforce to use personal devices on the job including laptops, tablets, smartphones or any other devices found acceptable by the company and are supported alongside devices the business owns.

Since all mobile devices are connected, this means that sensitive business information could be compromised. The BYOD trend in the workplace isn’t going anywhere, and companies need be safe. Here are some ideas for developing a mobile device management for business plan.


No Rooted or Jailbroken Devices Allowed

A “rooted” device is one that runs on the Android OS that has been modified to get around any restrictions the carrier may have applied. Similarly, a device that has been “jailbroken” allows users to install apps that have not been released through Apple’s App Store. These devices have been compromised and are vulnerable to viruses, malware, and other security weaknesses that secure devices have not. Rooted and jailbroken devices must never be used as part of BYOD.


Required Enrollment in the Company’s Mobile Device Management Suite

In order to enforce your company’s policies on security down to the device level, a mobile management suite must be used. The suite has to be joined into the business’s environment so that no user device can get access to company files until they are enrolled in the MDM suite. The devices must also be vetted by the company’s security codes.


Regular Operating System Updates

In order to stay ahead of malware, users must routinely update their devices with the latest operating systems. These updates include minor tweaks that can repair security vulnerabilities until the next major revision of the OS. A business can push updates and enforce the update policies from their mobile security management suites so that all devices stay at the most recent OS.


Lock All Device Screens With Passwords

This is security on the basic level that many owners neglect. All screens need to be locked with a password. Screen lock passwords are easy to set up for devices and provide a high level of protection from data theft. In the MDM suite, the use of screen locked passwords can be enforced.


Encrypt All Business Data

All data accessed by or within business apps must be encrypted so that if any devices become compromised, they don’t reveal the data in a readable form. When users are able to access data in an offline mode, the device becomes especially vulnerable. Encryption will ensure security.


Keep Business Data and Personal Data Separate

MDM suites have the ability to erase data from devices in the event of a security breach or other serious issues that arise. This is why the company must provide sets of business apps that contain their own data separate from the user’s personal data. With good app planning and programming of the MDM suite, this separation should have no problem being achieved.


Contact us if you are looking to set up a mobile device management for business plan. Our knowledgeable staff is eager to assist you!