Why Should You Implement a BYOD Program?

Mobile Security

Phones and tablets are always within fingertips reach, making them the perfect tool for business. But checking your email using the coffee shop’s free wi-fi while grabbing your latte or opening that email from a potential client could be more harmful than beneficial.

The number of malware and ransomware attacks has been on the rise, with the most active year for ransomware being 2017, according to the Malwarebytes 2017 State of Malware Report.

There are many factors contributing to the increase of ransomware and malware attacks:

 

  • Out-of-date software
  • Lack of backup plans
  • Commercial malware (cybercriminals selling malware to nontechnical criminals)

The biggest reason malware is able to spread so efficiently is: vulnerable organizations not investing in cybersecurity protocols and procedures, such as arming their employees with the proper resources and technology to protect their business and their clients.

As seen in the Target (2013) and Office of Personnel Management (2015) data breaches, third-party contractors, and core employees are the most vulnerable points of entry into a company’s network. Which is why you should invest in proven-effective cybersecurity practices. Computers and PCs have firewalls while not 100% effective, they are still effective. So how do you implement a security strategy that covers your employees' mobile devices?

A BYOD (Bring Your Own Device) program. It allows for your employees to access company networks and private information from their personal devices, which allows for:

  • Increased productivity because employees can work anywhere with a device that they’re comfortable using
  • Save money because companies don’t have to provide the device
  • Employee satisfaction because they get to use the device they choose

The major concern with BYOD programs is security, understandably so- but BYOD paired with multi-factor authentication tools, like smartcards or derived credentials provide an extra level of security.

In 2016, the Navy Reserve launched a BYOD program, called R2S (Ready 2 Serve). The app allows Reservists to securely access their Outlook Web Access (OWA) email and government documents from their personal mobile devices using Thursby’s Apple and Android hardware with a customized version of our mobile web browser app, Sub Rosa (available for Apple and Android) and their CAC card (government issued smartcards).

 Many companies don’t invest in cybersecurity because there’s no ROI. Think of it this way: your house may not burn down because of an old slow-cooker and you may not get the flu, but you still pay for homeowner’s insurance and get your annual flu shot- just in case, as a preventative measure. A cyberattack may not affect your business, but why risk it?