December 29, 2016 By Fran Howarth 2 min read

Bring-your-own-device (BYOD) is an unstoppable force. According to recent research sponsored by Tenable Network Security, 72 percent of organizations allow BYOD, with 40 percent making it available to all employees. Although BYOD risks can compromise enterprise security, the advantages are manifold. A successful BYOD program can improve employee and IT productivity, facilitate collaboration, reduce operating expenses and enhance customer support.

Developing a Policy to Reduce BYOD Risks

It is sensible to develop a policy that specifies what is acceptable and ensures that every user is aware of BYOD risks. An effective policy requires corporate data held on devices to be encrypted, the use of a PIN or password for unlocking devices, and remote wipe or lock capabilities. Many of these requirements can be controlled through the use of technology such as mobile device management (MDM).

But there are other aspects of a security policy that could be enacted to protect sensitive information and devices. For example, some security experts recommend activating an automatic locking function after a specified number of unsuccessful login attempts on a mobile device. Users may resist this policy, since it could potentially keep them from working and dent their productivity. They may even try to circumvent the process, especially if their devices are used for personal purposes as well as work.

Additionally, some users may have young children who get a hold of their devices. Their failed login attempts could inadvertently lock a phone or tablet. The growing use of fingerprint recognition can also be problematic, since it can often require several attempts to get a correct match.

Balancing Security With Practicality

To deal with these issues, organizations must reach a happy medium that balances practicality with security. Unless an enterprise has a help desk that is manned 24/7, user frustration will be high if workers are locked out after hours. Requiring users to contact the help desk will also add to the costs for an organization.

One alternative is to set the lockout duration to a specific time period, such as 30 minutes, before users are able to try again. The duration could increase upon repeated failed attempts, perhaps by an hour or more. This may still be frustrating for users, but it can help prevent anyone who has found or stolen a device from guessing the password. It will also provide a window of opportunity for users to report devices as missing, during which the IT department could wipe the device remotely — so long as MDM tools are used and containerization is enabled so work and personal data are kept separate on one device. Another alternative is to set up a web-based service for employees to request temporary passwords, which are then automatically generated and sent to corporate email addresses.

BYOD risks are real, but it is imperative to strike a balance. Account for security, but do not prevent users from accessing their devices for long periods of time. Requiring that devices are locked after a certain number of failed login attempts is widely considered good policy, but only if procedures are put in place to complement security requirements with practicality. Those procedures need not be onerous to reduce BYOD risks and ensure effective mobile security.

More from Endpoint

Unified endpoint management for purpose-based devices

4 min read - As purpose-built devices become increasingly common, the challenges associated with their unique management and security needs are becoming clear. What are purpose-built devices? Most fall under the category of rugged IoT devices typically used outside of an office environment and which often run on a different operating system than typical office devices. Examples include ruggedized tablets and smartphones, handheld scanners and kiosks. Many different industries are utilizing purpose-built devices, including travel and transportation, retail, warehouse and distribution, manufacturing (including automotive)…

Virtual credit card fraud: An old scam reinvented

3 min read - In today's rapidly evolving financial landscape, as banks continue to broaden their range of services and embrace innovative technologies, they find themselves at the forefront of a dual-edged sword. While these advancements promise greater convenience and accessibility for customers, they also inadvertently expose the financial industry to an ever-shifting spectrum of emerging fraud trends. This delicate balance between new offerings and security controls is a key part of the modern banking challenges. In this blog, we explore such an example.…

Endpoint security in the cloud: What you need to know

9 min read - Cloud security is a buzzword in the world of technology these days — but not without good reason. Endpoint security is now one of the major concerns for businesses across the world. With ever-increasing incidents of data thefts and security breaches, it has become essential for companies to use efficient endpoint security for all their endpoints to prevent any loss of data. Security breaches can lead to billions of dollars worth of loss, not to mention the negative press in…

Topic updates

Get email updates and stay ahead of the latest threats to the security landscape, thought leadership and research.
Subscribe today