{% set baseFontFamily = "Open Sans" %} /* Add the font family you wish to use. You may need to import it above. */

{% set headerFontFamily = "Open Sans" %} /* This affects only headers on the site. Add the font family you wish to use. You may need to import it above. */

{% set textColor = "#565656" %} /* This sets the universal color of dark text on the site */

{% set pageCenter = "1100px" %} /* This sets the width of the website */

{% set headerType = "fixed" %} /* To make this a fixed header, change the value to "fixed" - otherwise, set it to "static" */

{% set lightGreyColor = "#f7f7f7" %} /* This affects all grey background sections */

{% set baseFontWeight = "normal" %} /* More than likely, you will use one of these values (higher = bolder): 300, 400, 700, 900 */

{% set headerFontWeight = "normal" %} /* For Headers; More than likely, you will use one of these values (higher = bolder): 300, 400, 700, 900 */

{% set buttonRadius = '40px' %} /* "0" for square edges, "10px" for rounded edges, "40px" for pill shape; This will change all buttons */

After you have updated your stylesheet, make sure you turn this module off

BYOD Implementation Lesson 1: Train Your Employees

by John Ciarlone on May 22, 2014

byod implementation

Bring-Your-Own-Device policies are revolutionizing how employees work, but they bring their own challenges. Allowing your employees to use their own devices means they have additional security burdens that must be met to maintain company security.

Ultimately, a successful BYOD deployment requires training.

Short on time? Download our Free guide to successful BYOD deployment 

BYODPreparing Your Employees For Secure BYOD Implementation

1 - Create a written policy.

It begins with a clear, coherent, and achievable written policy governing its proper usage, security features, and rules of operation.

These will vary greatly from business to business, because BYOD use will be different everywhere. We suggest polling your employees about how they think they'd use personal devices, and craft your policies around their planned usage.

However, you need a bedrock policy to begin with, one all your employees can read and sign off on themselves indicating understanding and compliance.

2 - Training sessions review NPI policies.

Few, businesses today can avoid dealing with Non-Public Information. Virtually any customer information is protected by regulations, with strict laws governing matters such as data retention.

Whether it's the first time, or a refresher course, put your employees through NPI training when implementing BYOD. That will strengthen the learning experience, as well as putting it within a framework: These are the laws that everyone must follow.

3 - Choosing Strong Passwords

Ultimately, your security systems are only as strong as the worst password into them. All it takes is one person using their wife's name, or (worse) "123456," and your systems are vulnerable. At the other extreme, if your passwords are required to be monstrosities like "XK$4CD9!%TJ" then it's guaranteeing they'll be written on post-it notes.

There are several different strategies for strong and memorable passwords, but we suggest using passphrases instead. If everyone picks a short phrase from a favorite book or movie or poem, it's going to be hard to crack, hard to guess, and yet easily memorable for the employee.

For example: "TomorrowIsAnotherDay" or "GoodFencesMakeGoodNeighbors." Add an exclamation point or question mark at the end for a stronger password.

Just make it a little obscure. If someone were a known Star Wars fan, virtually any line besides "UseTheForceLuke" would work. But not that one.

4 - Physical Device Security

The biggest challenges BYOD security brings to your employees relate to the devices themselves, which byod securitybecome a weak point for attack. Among the most important policies to enforce:

  • Every device utilizes a password, passcode, or biometric security. No exceptions.

  • "Jailbroken" devices should not be allowed on the network, since their security has been compromised.

  • Public cloud servers like Dropbox should never be used for business data. (Google is a possible exception here, with their business focus.)

  • Never, ever keep a list of passwords on a personal device.

  • Never, ever store customer data on a non-corporate issued device.

  • If a device is lost or stolen, it should be immediately reported to the network administrator.

Also, maintain a blacklist of blocked sites, especially for porn and pirated media. This can vastly reduce security problems, as well as preventing employees from using company bandwidth to pad out their video collection.

5 - Beware Social Engineering

Finally, while it's too complex a topic to go in-depth here, a smart company will incorporate social engineering training into implementation.

Simply put, social engineering is "hacking" people, using confidence tricks and mind games to gain access to secure areas. They can undermine even the best computerized security policies.

There are plenty of security experts who give lectures on social engineering and how to avoid it; consider bringing one in for a company-wide training day.

Smart Employees Make Smart BYOD Policies

When going to BYOD, you can't assume your employees will automatically know how to use it responsibly and ethically. A strong security training program will ensure they maintain systems security, even while working from their iPad or Galaxy.

For more security tips, follow this blog, or call us with your questions!

Topics: BYOD, Wireless

Explore Our Full Cisco Line Up
VIEW MORE ABOUT CISCO
cisco devices-2