Five Keys To Network Security In A BYOD Environment
One major challenge businesses face in maintaining effective security is the trend of employees using their own devices for work. ‘Bring your own device’, or BYOD, refers to employees using any of their personal devices on your network. At the very least, your employees are likely using their smartphones. There are a number of reasons why this complicates things from an IT standpoint, but at IS Decisions, Francois Amigorena explains some ways to improve security in a BYOD environment.
- Concurrent Logins
A vital move to securing your network while employees are using multiple devices to access it is to prevent concurrent logins. Each employee is given specific credentials and are unable to log in with those credentials if they’re being used on another device. This potentially creates some issues with employees being logged in on their desktop and being unable to gain access remotely, but it also prevents lost or stolen device from being able to access the network freely.
- Session Time Limits
In conjunction with login limitations, it’s important to implement time limits for employees’ active sessions. After a set time, the device would automatically prompt users to log in again using their credentials. This protects against the possibility of a logged in device being compromised.
- Limited Access
Regardless of the device they’re using to access your network, most employees don’t need access to everything available on the network. It takes meticulous planning, but limiting what files and applications each user is able to access greatly increases security by reducing the potential for complete disaster. Even if a third party gains access through a lost device, they won’t be able to control your entire network.
- Log Devices
If employees are regularly using your network with multiple devices, it’s important to keep a running log of those devices. This way, if an employees access requirements change, you can quickly change their permissions for all applicable devices. Likewise, should an employee leave the company, you can quickly end access for their devices to keep them from taking valuable data with them.
- Monitor Closely
It’s important to always closely monitor the activity on your network, but this becomes more important when users are potentially bringing in threats on their own devices. Log in attempts from unrecognized devices, or log ins at odd hours, or sessions moving large amounts of data should all trigger flags. This will allow you to minimize damage.
BYOD is only one challenge that business owners face every day regarding their network’s security.
If you need help improving security at your company, call Geek Rescue at 918-369-4335.May 20th, 2014