<img height="1" width="1" style="display:none;" alt="" src="https://px.ads.linkedin.com/collect/?pid=308252&amp;fmt=gif">

{% set baseFontFamily = "Open Sans" %} /* Add the font family you wish to use. You may need to import it above. */

{% set headerFontFamily = "Open Sans" %} /* This affects only headers on the site. Add the font family you wish to use. You may need to import it above. */

{% set textColor = "#565656" %} /* This sets the universal color of dark text on the site */

{% set pageCenter = "1100px" %} /* This sets the width of the website */

{% set headerType = "fixed" %} /* To make this a fixed header, change the value to "fixed" - otherwise, set it to "static" */

{% set lightGreyColor = "#f7f7f7" %} /* This affects all grey background sections */

{% set baseFontWeight = "normal" %} /* More than likely, you will use one of these values (higher = bolder): 300, 400, 700, 900 */

{% set headerFontWeight = "normal" %} /* For Headers; More than likely, you will use one of these values (higher = bolder): 300, 400, 700, 900 */

{% set buttonRadius = '40px' %} /* "0" for square edges, "10px" for rounded edges, "40px" for pill shape; This will change all buttons */

After you have updated your stylesheet, make sure you turn this module off

BYOD Is All Rainbows And Unicorns Until This Happens!

by Picture of John Ciarlone John Ciarlone on July 10, 2014

Bring-Your-Own-Device is happening in businesses around the world, and it may even be happening in yours – byod managementwhether you have a BYOD policy or not. The proliferation of “smart” Internet-capable devices are creating a workforce that's simply accustomed to making their smartphone or tablet part of their business life.

When they get to work, they log their iPad onto the network, and keep on rolling. Second-screen productivity tools are now a hot topic. Multiple screens are no longer simply for sysadmins and data-crunchers. Virtually any worker can find ways to implement their devices in business capacities, and they are.

 Short on time? Download our Free guide to successful BYOD deployment 

So, it's easy for a company to figure “BYOD isn't causing problems, so why worry?” Well, it's is one of those things that works well right up until something goes wrong. That's when a company starts to wish it had more robust BYOD policies.

BYOD

Three Common Security Issues To Watch For Successful BYOD Management

1 – Compromised Devices

How secure are all the personal devices in your office? Do you know if everyone's keeping their system software and (if applicable) anti-malware tools up to date? Is anyone using a compromised or “jailbroken” phone that could potentially host illegal applications?

Are they even protecting their devices with a passcode?

The single biggest danger is that personal devices make any connecting device into a potential route onto your network. A single compromised device, or lost iPhone, could turn into a major security disaster.

To deal with this:

  • Require up-to-date OS patching.

  • Make passcodes or biometric security mandatory.

  • Ban jailbroken devices.

  • Implement app-specific security on your most critical virtual systems.

  • If possible, use a vWLAN setup that puts security on the cloud, rather than on a server.

2 – Data Mishandling

This is so simple for an employee to do, even in complete innocence and with good intentions. It's easy to move data onto mobile devices, and it's easy to transfer the data into insecure public cloud systems, like Dropbox. But if even a single customer record makes it into malicious hands, it could bring huge financial penalties down on your company.

Your users should never:

  • Put customer or other company data on their mobile device.

  • Store protected data in unapproved third-party cloud systems.

  • Automatically auto-fill passwords to protected systems.

Additionally, consider adding extra tiers of security and access privileges. You can head off a lot of potential data emergencies by preventing access to any systems an employee has no actual need to access.

Or, put them on separate subnets. This is a good way, for example, to keep your R&D division shielded from everyone else.

3 – Malicious Accessbyod

A greater WiFi deployment brings greater opportunities for hackers and other malcontents to try to break into your system. This is especially true with wide-scale deployments across facilities too large to monitor visually.

If you can't see all your users, you need security policies that keep them out.

  • vWLANs can block access directly at the Access Point, boosting your defenses.

  • Smart virtualized security systems can monitor for unauthorized access.

  • Worker refresher courses on basic personal security and avoiding “social engineering.”

  • Application-level security adds additional barriers.

  • Hiding your work-critical SSIDs and Subnets makes them “invisible” to casual hackers.

  • A separate “Guest Network” Internet Access keeps people away from work systems.

Are You BYOD Ready?

Your workers are probably already accessing your network with their personal devices. Are your security systems up to the task? Bringing your own device allows huge productivity benefits, but only if your policies are ready for the new challenges it creates.

To learn more, take a look at our free guide to vWLANs and WLANs to see how virtualized systems offer the superior security and flexibility necessary for safe BYOD access!  

 

 

Topics: BYOD, Wireless

Explore Our Full Cisco Line Up
VIEW MORE ABOUT CISCO
cisco devices-2