Skip to Search Skip to Content Skip to Footer
Sims Recycling Solutions
  • Locations
  • News
  • Client Portal
  • Contact
  • English
    • Deutsch
    • Nederlands
Menu
  • Data Center
    • Hyperscale Data Centers
    • Data Center Shutdown
    • Infrastructure Reuse
    • Data Destruction
    • Recycle the Cloud
    • How We Do It
  • Reuse
    • ITAD
      • Gartner’s Market Guide for IT Asset Disposition (ITAD) Report
      • RFP Template for ITAD
      • Quick ITAD Checklist
    • IT Asset Recovery
      • Equipment Purchase
    • Data Destruction
      • On-Site Data Destruction
      • At SRS Facility
      • Storage Device Types
      • Data Destruction Standards
      • Vendor Selection
      • Get A Quote
    • Decommissioning of Data Centers
      • Cloud Services
      • Data Center Shutdown
      • Infrastructure Reuse
      • Data Destruction
      • Recycle the Cloud
      • How We Do It
    • The Sims Portal
    • Logistics
    • SRS offers a well-defined, systematic program to manage disposition of retired IT assets. We protect your data, control your assets, maximize value recovery and meet regulatory and corporate risk management requirements. Learn more about our services including the systematic removal of retired equipment from data centers and on-site data destruction services.
  • Recycle
    • Recycling for Businesses
      • Reporting
      • How We Do It
    • e-Recycling for OEMs
    • Secure Destruction for Electronic Producers
    • Pre-Treated Materials
    • Advanced Material Recovery
    • Tailored Solutions
    • Refining
      • How We Do It
      • Governance
    • Consumer E-Waste
    • SRS works with electronic OEMs, leading regional and global businesses, distributors, national recycling schemes, waste collectors and electronics recyclers. Our complete e-waste and WEEE services help organizations meet legislative requirements, corporate compliance requirements and sustainability goals while protecting data.
  • Global
    • Compliance
      • GDPR FAQ
    • Circular Economy
    • International Associations
    • Equipment We Process
    • Leading companies trust SRS to provide a globally coordinated e-waste recycling and ITAD single solution with a high focus on data security, regulatory and corporate compliance, value recovery and sustainability.
  • About Us
    • Certifications
    • SHECS
    • Careers
    • As a part of Sims Metal Management Limited, SRS has the global reach, expertise, and infrastructure necessary to ensure to our customers that all electronic devices are processed in a secure and environmentally responsible manner.
  • Blog

Trusted Mobility: Top Tips to Ensure Bring-Your-Own-Device (BYOD) Security

Menu
  • Locations
  • News
  • Client Portal
  • Contact
January 2, 2014
by SRS Media

top-tips-ensure-byod-security

Organizations everywhere have discovered the many benefits of today’s mobile data availability. Team members, now are able to instantly access the company IT infrastructure from any location and can deliver both customer service and actionable intelligence on a far more consistent, rapid and flexible basis. Productivity is increasing and the effective creative power of a single user is growing by leaps and bounds. Best of all, many of the costs associated with enterprise IT infrastructure are disappearing as less expensive smartphones and tablets begin to replace the prior generation of desktop PCs.

Computing is also becoming more personal. As a natural extension of enterprise mobile computing, over 60 percent of employees worldwide now report regularly using their personally owned mobile devices at work. This trend, generally referred to as BYOD (Bring Your Own Device), offers many continuing benefits: more productive and satisfied employees, the ability to keep up with the latest and most popular platforms, as well as cost savings stemming from employees purchasing their own devices and data plans.

However, the very qualities that make data mobility so attractive and convenient also introduce new potential security, cost and liability risks. From mitigating loss and theft to ensuring regulatory compliance, defining and defending trust in mobile information remains a growing challenge for organizations at the leading edge of this technology trend. Don’t become a cautionary tale for unprepared mobility. Unleash the power of your BYOD networks by following these strategies for secure and safe mobile device management.

Tip #1: Plan for Employee-Owned Mobile Devices to be Lost or Stolen

Mobile devices today are a natural fit for the business traveler, providing an easy route to vital information and communication while on the road or in the air. However, travel also offers one of the most robust opportunities for thieves eager to steal valuable electronics.

Over 40 percent of reported robberies in New York City involve the theft of smartphones. In Washington, D.C., the rate of mobile phone theft jumped by 54 percent between 2007 and 2011. Portable, small and valuable, these devices represent lucrative targets for enterprising pickpockets.

And theft is not the only problem – mobile devices are often lost. A recent study documented over 7,000 devices lost in seven major U.S. airports over a twelve-month period, a number evenly divided between laptops, smartphones and tablets. Theft and loss will happen. Be prepared with a solid plan of response.

Top-Tips-Ensure-BYOD-Security-1

Tip #2: Back up Your Data

Is your company’s data being securely stored and protected in an industry-standard facility, or is that all-important spreadsheet stored only on someone’s iPhone? Don’t wait until a loss is reported to find out. Implement infrastructure and policies to ensure that your organization’s information is regularly backed up.

Tip #3: Create a Comprehensive BYOD Policy

It is estimated today that up to 80 percent of organizations that rely on personal mobile devices have no formal, clearly stated policy outlining the security requirements for using them.

Top-Tips-Ensure-BYOD-Security-2

What forms of encryption will your organization require for managing company assets? What minimal security controls will be necessary before an employee-owned device can be certified for work use? If the employee leaves the company, or if the device is lost or stolen, what rights and abilities does the business have to remotely erase confidential data stored on it? How is acceptable use defined in terms of company computing? Answer these questions early and comprehensively.

Tip #4: Enforce the Policy

In a recent survey, over 50 percent of 3,200 respondents stated they were fully prepared to ignore security and usage policies regarding their use of personal mobile devices at work. Your BYOD policy does no good if it is not vigorously enforced. This task can be effectively automated via many currently available third-party mobile device management (MDM) software systems.

Tip #5: Keep IT Support Open

One of the most attractive benefits commonly touted for BYOD programs is the ability to cut the number of resulting help desk IT support requests. However, you should work to keep lines of communication and support open. In a survey, 14 percent of respondents indicated that they would not inform their employer in the event that their device was compromised. If you are not careful, the support costs that you save today can return to you with hefty interest later.

Tip #6: Don’t Limit your Policy to just Mobile Devices

An effective BYOD policy is not a device use policy, but a data use policy. More and more, mobile data usage is extending well beyond the scope of the personal device and into the cloud. Write your BYOD policy to include use of company data in online services such as Dropbox and Google Drive – any environment that may host mobile data outside the walls of your company’s IT infrastructure.

Tip #7: Set Boundaries

Often times, BYOD vulnerabilities arise from employees being unaware of the technology policies in place, or being unaware that they will be fully enforced. Establish a program of employee education that covers all of the essentials: how to securely store data, what security expectations exist, how the company can access and control data being stored on personal devices, and who owns the information being stored. Set boundaries with clear and unambiguous guidance.

Top-Tips-Ensure-BYOD-Security-3Tip #8: Create a Secure IT Asset Disposal Program

Most new mobile device purchases are motivated by the desire for upgraded features, new technology, faster and more robust performance, or simply to enjoy the latest version of a popular platform. With the rapidly evolving mobile electronics landscape today, older devices are discarded relatively often. But what happens to them after they have been replaced?

The truth is, with the right technology and knowledge, data can be retrieved from even an erased smartphone in under three minutes – a serious danger for BYOD-reliant companies, considering that an estimated 50% of IT devices purchased on the Internet today still have data on them. To fully protect your company’s assets, provide a secure IT asset disposal program that enables your employees to safely and conveniently retire their old devices.

To view the most recent E-Solution News, click here.

Posted in: Digital Data Destruction, IT Asset Disposition
Previous Post Next Post

Data Center Services

Learn More

Need to Replace Arrow?

Learn More About SRS

Sims on the Road

We will be attending these upcoming industry related trade shows and conferences.

Join us!

Related Posts

  1. Awareness Initiative: International E-Waste Day on October 14th 2019
  2. Launching a data center decommissioning project? Here is what you need to know
  3. After Arrow, What is Next? How to Choose Your Next ITAD Vendor.
  4. How Data Center Decommissioning can Improve Your Carbon Footprint

Regions

  • Americas
  • Global
  • EMEA
  • APAC

Topics

  • Blog Series
  • Data Center Decommissioning
  • Digital Data Destruction
  • E-Waste (WEEE) Recycling
  • GDPR
  • Global ITAD Solutions
  • IT Asset Disposition
  • IT Asset Remarketing
  • IT Asset Tracking
  • Just For Fun
  • Media Coverage
  • Mobile Phone Refurbishment
  • OEM Compliance
  • Refining (Metallurgy)
  • Sims Announcements
  • Sustainability
  • Waste Disposal Issues

Archives

Sims Recycling Solutions
  • Corporate Information
    • About Us
    • Certifications
    • Locations
  • Services
    • Reuse
    • Recycle
    • Refining
    • Data Destruction
    • Decommissioning
    • Global Services
  • Contact
    • Newsroom
    • SRS Blog
  • Sims Metal Management
    • SRS is a business of SMM, a leading metal recycling company.
      Visit the SMM Site

Sign up for our newsletter

  • This field is for validation purposes and should be left unchanged.
  • Visit Us on Instagram (opens new window)
  • Visit Us on Twitter (opens new window)
  • Visit Us on Facebook (opens new window)
  • Visit Us on LinkedIn (opens new window)
Copyright © 2003 - 2019 Sims Recycling Solutions, Inc. All Rights Reserved.
  • Privacy Policy
  • Legal
  • Terms of Use