If you’re like me, you’ve heard plenty of vague recommendations for securing employee-owned mobile devices. Enough! Let’s get down to brass tacks. IT managers are telling me they need real, tactical advice they can put into action. And that’s exactly what you’ll get out of this new analyst report by IT-Harvest: “A Guide to Consumerization & Building a BYOD Policy.”
This how-to guide covers 5 Best Practices for BYOD and includes a checklist for developing flexible, yet secure BYOD policy. The goal here is to help you gain full visibility and control of mobile devices and consumer apps—not to mention your company data that’s put at risk.
As explained by IT-Harvest principal analyst Richard Stiennon (yes, the most followed IT security analyst on Twitter): “Processes must be put in place to revoke certification if the device becomes compromised [or] if the employee uses it in a way that violates organizational policy…”
Stiennon’s 5 Best Practices for BYOD include:
- A registry of risky apps that cannot be used
- User authentication and data encryption
- Employee compliance and communication
- Remote lock and wipe, including selective wipe that targets only corporate data
I strongly recommend reading the full, detailed report and sharing it with your IT team: “A Guide to Consumerization & Building a BYOD Policy.”
What have you missed on the policy checklist?