IT | Security

BYOD Security Policy Best Practices

By: Absolute Team | 10/1/2012

If you are looking for tips on how to develop your bring-your-own-device (BYOD) security policy, SearchConsumerization has put together a series of best practices and considerations which we summarize below with a few additions:

  • Encrypt devices and/or folders that contain business data
  • Always download the latest hardware and app updates
  • Register all devices before allowing them access to your network
  • Authenticate devices using Secure Sockets Layer certificates
  • Use software such as Absolute Manage for the ability to remotely lock or wipe a personal device that is lost or stolen
  • Consider app blacklisting in your MDM system
  • Enforce user data access controls
  • Ensure your policy is in line with all industry standards and requirements
  • Run employees through training on reporting lost devices, use of email, and other data best practices

No matter what device your employees are using, it only takes on solution to manage them all. We can help you automate the employee mobile device enrolment process, install / remove apps (by user / device status / role), send commands that control roaming or status, monitor encryption status, send messages to users and lock / wipe lost devices. Learn more about Absolute Manage here.

For more information, read our primer on how to build a BYOD policy in three easy steps.