Mobile Device Security in a BYOD World

Tuesday, January 29, 2013

Robert Siciliano


In the real world there is little difference between an employer’s issued device and a personal mobile device.

The most important difference should be that a digital device issued by your employer requires and should have a “company mobile liability policy”. Businesses generally provide and pay for employee mobile devices, and also strictly dictate what you can or cannot do on the device.

For IT security reasons, the employer may have remote capabilities to monitor activity and in the event of loss or employee termination wipe the data.

Mobile device security policies” are for the BYOD or “Bring Your Own Device” employees. The employee may pay for the device and its monthly plan and has also imposed security restrictions and limitations on employees who use their personal devices at work. 

If you choose to use your personal device for employment purposes at any time for any reason then your employer may take control over that device to protect themselves. In a company mobile liability policy, the employer often has remote capabilities to monitor activity and in the event of loss or employee termination wipe the data.

A recent study shows less than 10% of people BYOD employees auto lock their tablets and people were more security-savvy about their smartphones, with 25% locking.

Most employee issued mobile management software will require the device to be locked and the password to be changed quarterly. These mobile device security programs tell you in the terms and conditions that the contents on the device is subject to being monitored and at any time the device can be wiped by the employer.

The employer is liable for potentially lost data on your mobile. So, to maintain security in a BYOD world, plan on giving up some liberties.

Robert Siciliano personal and small business security specialist toADT Small Business Security discussing ADT Pulse on Fox News. Disclosures

Possibly Related Articles:
Enterprise Security
Information Security
Mobile Devices Policies and Procedures BYOD
Post Rating I Like this!
The views expressed in this post are the opinions of the Infosec Island member that posted this content. Infosec Island is not responsible for the content or messaging of this post.

Unauthorized reproduction of this article (in part or in whole) is prohibited without the express written permission of Infosec Island and the Infosec Island member that posted this content--this includes using our RSS feed for any purpose other than personal use.