How to Secure Personal Mobile Devices (Without Making Your Employees Hate You)

Personal Devices – Are Used for Work by Both Remote and On-site Employees… a Lot

It’s no surprise that more people than ever before are bringing their personal devices into work in 2017 and, unless you’re a bank or a government agency, you’re most likely not stopping your employees from this behavior. You want to keep your employees happy, inspired, and productive, making it as easy as possible for them to get their work done while staying connected to their family and friends.

There are, of course, major security risks that you must defend your organization against now that this practice has multiplied your attack surface by the hundreds, if not thousands. Let’s talk a bit more about the changes that have happened in recent years in order to grasp the challenges presented by our ever-changing work environment.

The Shift From Corporate-Issued Devices to Personal Devices

A recent Gartner survey found that only 23 percent of employees surveyed had corporate-issued smartphones. The trend from only a decade ago of executives, and some employees, being given a corporate mobile device (phone or tablet) along with their work laptop or PC has taken a swift nose dive.

But, of course, that doesn’t mean employees just aren’t using mobile devices at work – in fact, that number has skyrocketed in recent years due to BYOD policies being relaxed.

Nearly eighty percent of employees bring their personal mobile device to work. You know that guy at your office who’s super into that silly strategy gaming app? He’s probably not paying much attention to the rights that application has on his device or the legitimacy of its developer. Maybe that sales professional in your organization who’s on the road 90% of her life accesses her corporate email from an old Samsung smartphone, with no idea (Read more...)

*** This is a Security Bloggers Network syndicated blog from Cylance Blog authored by The Cylance Team. Read the original post at: https://threatmatrix.cylance.com/en_us/home/how-to-secure-personal-mobile-devices.html