Blog Home > Cyber Security > Considerations for Developing BYOD Security Guidelines

Considerations for Developing BYOD Security Guidelines



BYOD Security Guidelines Back in 2002 would it have surprised you to know that in only a short amount of time almost everyone would have a cell phone? Let alone a cell phone that would have access to the internet? It sure would have taken me by surprise and that brings us to the reality of today’s world in 2017. Almost everybody has their own smart device, albeit an iPhone, a laptop, a tablet, you name it! This is a huge leap for the technological world, and society, but it also brings many questions to light. Today we’re going to explore how to approach BYOD (bring your own device) in the workplace or on your campus.

Why have BYOD Security Guidelines?

As a company or institution, your students or employees will most certainly have devices they would like to connect to the network you’re providing. This comes with risks, but the benefits of having them bring their own devices outweigh these risks. What is needed is to just set up some rules. If your company/institution deals with sensitive data, and having employees/students use their own devices would benefit the company/institution, then I would suggest a mobile security management suite to be installed on the phone. This allows users to separate work and personal phone use and this is for everyone’s benefit. Another issue with sensitive data to consider is how users may not password protect their devices. This can be solved by mandating devices in the network to be password protected.

PortalGuard Can Help at Ultimate Cyber Security

PortalGuard is excellent for this enforcing its Two-Factor Authentication and therefore making devices extra secure. PortalGuard is a leader in cyber security with its amazing Single Sign-on page that contains Two-Factor Authentication that is perfect for users bringing in their own laptop. This is ideal for students! While attending Rensselaer Polytechnic Institute we were told laptops were mandatory. With many login pages, it was a clumsy system. PortalGuard would’ve been excellent during my student days to add extra security, and ease of use to using my laptop at school. Yet another feature of PortalGuard is Self- Service Password Reset. This is desirable for Mobile Users allowing a very secure password reset on Mobile Devices when you happen to forget that pesky password.

Additional Steps

Another key to allowing users to bring their own devices would be enforcing an enrollment into an antivirus program. Obviously, this is in the best interest of the company/institution since it protects the network from malware and malicious attacks. Some companies/institutions may also want to limit or completely block users from certain sites to make sure productivity stays up. This is also a form of virus protection.

There are companies/institutions who set up a whole new WiFi system just for these foreign devices. This is an easy way to protect the network and control who or what can connect. If a new WiFi system isn’t in the budget then set up some regulations/policies on what devices would be accepted. The IT Help Desk would also need to be clear on what their role would be on servicing user devices, if any. Certainly, they should be able and willing to help users with problems relating to company business or student affairs, but should they be worried about fixing a phone that’s having trouble receiving a signal? Or should they leave that to the cellular provider? Lastly, another worry would be if these devices would even be compatible with the infrastructure already set in place. Would IT have to scramble to accept new devices, or would it be a slight change if any?

Create Your Own Handbook!

These questions and many more would be necessary to answer about users bringing their own devices. The best way for a company/institution to handle this would simple create a handbook on the topic and make the users read off and sign an agreement complying with the policies laid out. This site provides an excellent template!


Please follow and like us:
Rob K

Author: Rob K

Rob is an infinite being who enjoys to create art, uncover hidden truths, and spread love. He spent a little over 3 years at Rensselaer Polytechnic Institute studying computer science, information technology, and web science.

Leave a Reply

Required fields are marked *.

Main menu