• Skip to primary navigation
  • Skip to main content
  • Skip to primary sidebar
  • Skip to footer

My TechDecisions

  • Best of Tech Decisions
  • Topics
    • Video
    • Audio
    • Mobility
    • Unified Communications
    • IT Infrastructure
    • Network Security
    • Physical Security
    • Facility
    • Compliance
  • RFP Resources
  • Resources
  • Podcasts
  • Project of the Week
  • About Us
    SEARCH
Mobility

Overcoming the Cybersecurity Dangers of BYOD

In today’s high tech world, nearly everyone you meet owns a smartphone, tablet or laptop computer. And in the era of BYOD, any and all of these devices are being used for work.

September 6, 2018 Kim Del Fierro 3 Comments

iOS macOS vulnerabilities
stock.adobe.com

While that is certainly a convenience for employees and employers alike, for the men and women who sit in the CIO’s chair, BYOD is a source of constant headaches and frustration. Data breaches can happen at any time in the most controlled environments, and personal devices ensure a loss of control that keeps CIOs and data security teams up at night.

Personal Device Use by the Numbers

Indeed, recent survey data from Finn Partners paints a grim picture surrounding the use of personal security devices by employees. While a full 55 percent of employees BYOD, only 26 percent change log-in credentials on a monthly basis. Only 25 percent of these employees update the security protocols and operating systems on their devices each month.

When you look at phishing, the root cause of 95 percent of all breaches, the numbers grow darker still. In the June 2018 Finn Partners survey, nearly 40 percent of employees admitted to clicking on a link or opening an attachment from a sender they didn’t recognize. Two out of every five employees admit to putting their companies at risk both in the office and on their own devices. It should come as no surprise that one in three of these employees reports having been a victim of a cyber-attack or data breach.

Solutions in Sight

There are a number of steps an organization can take to minimize the risks that stem from BYOD policies. IT departments can work to limit access to company documents and records for smartphones and tablets. It can ensure that all data downloaded is fully encrypted. Cybersecurity professionals can and should enforce remote wipe policies and passcode locks on all devices being used for company use.

But in an era where nearly 40 percent of employees are going to click a link or open an attachment from someone they don’t know, in spite of years of training and workshops teaching them not to do so, smart cybersecurity teams will need to take solutions to the next level. The best recourse is to stop phishing attacks at the source before an employee even has the opportunity to make a company-changing mistake.

Take the Next Step in Cybersecurity

You’ll accomplish this by using preemptive anti-phishing solutions that stop phishing attacks from even entering your employee’s devices. That way you won’t have to worry about whether your employees will encounter phishing attacks at all. The risk of them compromising your organization’s sensitive data will be reduced to an all-time minimum. Taking this one step, while at the same time maintaining a continuous program of cyber hygiene, will eliminate nearly all cybersecurity threats to your company.

 

Kim Del Fierro is VP of Marketing for Area 1 Security.

If you enjoyed this article and want to receive more valuable industry content like this, click here to sign up for our digital newsletters!

Tagged With: BYOD, Cyber Security

Related Content:

  • Xyte Mobile View for Support Teams and IT Managers to Monitor and Manage Their Devices On The Go Xyte Unveils Mobile RMM for IT Managers to…
  • VuWall Enhances Operational Efficiency for SIMOS Control Center
  • Crestron Automate VX Microsoft Grants Teams Room Device Certification to Crestron’s…
  • Zoom Anthropic Claude AI Zoom IQ Zoomtopia 2023 Unveils AI-Powered Workspaces, New Features for…

Free downloadable guide you may like:

  • Blueprint Series Cover: What works for hybrid workBlueprint Series: What Works for Hybrid Work

    Download this free resource to learn about how IT leaders can effectively manage and implement a hybrid work model.

Reader Interactions

Comments

  1. MobiLock Pro says

    September 24, 2018 at 6:28 am

    The improving and usage of mobile technology has led enterprises to adapt device policies like BYOD, COPE or CYOD. The device policies allow enterprises to reduce IT cost and improve productivity, but security concerns have always been a grave issue with such device policies. Mobile Device Management (MDM) solutions have been the ultimate respite to resolve the security issues and have allowed enterprises to easily and efficiently manage, secure and track the deployed devices and highly critical corporate data and assets without interfering with the independence of the employees to use the devices.

    Reply

Trackbacks

  1. My TechDecisions Week in Review: Cybersecurity, Mass Notification, Space Force, Etc. - My TechDecisions says:
    September 7, 2018 at 12:00 pm

    […] Overcoming the Cybersecurity Dangers of BYOD […]

    Reply
  2. Need a BYOD Projector? InFocus Offers Nine New Models - My TechDecisions says:
    November 7, 2018 at 2:00 pm

    […] you’re following the BYOD trend by encouraging your employees and students to use the own smartphone, tablets, computers and […]

    Reply

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Latest Downloads

Practical Design Guide for Office Spaces
Practical Design Guide for Office Spaces

Recent Gartner research shows that workers prefer to return to the office for in-person meetings for relevant milestones, as well as for face-to-fa...

New Camera Can Transform Your Live Production Workflow
New Camera System Can Transform Your Live Production Workflow

Sony's HXC-FZ90 studio camera system combines flexibility and exceptional image quality with entry-level pricing.

Creating Great User Experience and Ultimate Flexibility with Clickshare

Working and collaborating in any office environment today should be meaningful, as workers today go to office for very specific reasons. When desig...

View All Downloads

Would you like your latest project featured on TechDecisions as Project of the Week?

Apply Today!

More from Our Sister Publications

Get the latest news about AV integrators and Security installers from our sister publications:

Commercial IntegratorSecurity Sales

AV-iQ

Footer

TechDecisions

  • Home
  • Welcome to TechDecisions
  • Contact Us
  • Comment Guidelines
  • RSS Feeds
  • Twitter
  • Facebook
  • Linkedin

Free Technology Guides

FREE Downloadable resources from TechDecisions provide timely insight into the issues that IT, A/V, and Security end-users, managers, and decision makers are facing in commercial, corporate, education, institutional, and other vertical markets

View all Guides
TD Project of the Week

Get your latest project featured on TechDecisions Project of the Week. Submit your work once and it will be eligible for all upcoming weeks.

Enter Today!
Emerald Logo
ABOUTCAREERSAUTHORIZED SERVICE PROVIDERSYour Privacy ChoicesTERMS OF USEPRIVACY POLICY

© 2025 Emerald X, LLC. All rights reserved.