BYOD Scenarios

September 6, 2013

A comprehensive Bring Your Own Device (BYOD) policy and its effective implementation can harvest the maximum potential of BYOD. An essential part of a comprehensive BYOD policy is handling of anomalous scenarios. The key scenarios to be considered while framing a BYOD policy would be:

Exposure of Company data:
The accessibility of company sensitive information to employees is always a risk. With BYOD, the risk gets magnified.  Possibilities of tipping off sensitive information through text messaging, loss/theft of device contribute to the risk list. This can be mitigated by using secure wipe-out policy where company data can be removed remotely in case of loss/misuse of the device.

Storage of password:
Employees may store their passwords in device memory or applications. This increases the risk of stolen passwords during unauthorized device access. BYOD policy can prevent this by not allowing storage of company passwords in device. Still, if the employees wish to retain passwords, they can be allowed to save through a secure encrypted application.

Decline of productivity:
Employees can use the device for non-official works (like social networking, chat) due to availability of carrier networks. This leads to loss of productivity. Establish a policy that devices can be used for only official works through the corporate network.

BYOD brings about a wider list of possible devices and platforms. It poses hurdles to manage and support them. Limiting the number of allowed platforms, usage of NAC (Network Access Control) tools can reduce the difficulties in allowing compatibility.

Network usage:
Allowing BYOD can lead to usage of both personal mobile devices and desktops in office. This can bring additional stress on the network. Increasing the network’s bandwidth, deploying network equipment with high security features will ensure fewer bottlenecks stabilizing the network.