Privacy / Security

Four mobile BYOD & cyber security trends in 2017

23rd Mar `17, 05:34 PM in Privacy / Security

Since most everyone these days seems to check their email on their phone, and uses laptops and tablets…

Daphne
Daphne Stanford Contributor
Follow

Since most everyone these days seems to check their email on their phone, and uses laptops and tablets to complete work remotely—as well as in the office—companies must have a robust and failproof security policy as well as measures in place, in the event of a security breach.  What is the future trending toward in terms of what are considered minimum security protocols now and what will become standard in the future?

1. Authentication Capabilities

Although it may seem to be the stuff of movies, biometric authentication is becoming an option for more mobile devices than ever before, making it feasible that this kind of personalized verification will be available for both BYOD and in-house corporate devices in the not-too-distant future.

However, some argue that two-factor authentication is superior to biometrics—and, of course, one of the factors could be biometric in nature, like a fingerprint.  Having access require a password as well simply strengthens the security of the given device, rendering it closer to fail safe.  Moreover, there should be a number of passwords required to even access the mobile device, let alone a particular email server or work-related program on that device.  Passwords should also have strong requirements—such as at least three special characters—as well as regular updates.

2. VPN Encryption

All information that is accessible remotely should be encrypted—just as it is on-site.  To this end, a Virtual Private Network (VPN) is key.  Especially if you work remotely and regularly utilize public WiFi networks, you’ll want to make sure your data is encrypted.  Part of the reason for this is that public Wi-Fi is a favorite access point for hackers, who regularly employ tactics such as ghost phishing in order to capture private data.

3. Containerization

According to Tektonika Mag, containerization isolates business content into its own workspace that can be removed from a mobile device, if necessary.  This is useful for two reasons: first, organizations can keep business information secure while still allowing employees to use their devices for both work and personal business; second, if an employee leaves the company, subsequent removal of company content goes much more smoothly than if information were not contained in its own section.

4. CYOD Versus BYOD

Of course, if you want to forego the need for such complex security measures, you could always implement a slightly different approach with similar benefits: rather than BYOD, there is an option called CYOD, which stands for Choose Your Own Device.  This option, according to University of Alabama at Birmingham, is “a good compromise because employers will provide a list of approved devices for employees.  Business software and security come pre-installed, but the device belongs to the employee.”  It helps to have an IT department dedicated to keeping company devices up to date with the latest in virus protection software.  As long as this is the case, however, security is apt to be substantially higher and more robust with a CYOD policy.

BackupAssist furthers the argument by pointing out that BYOD has the potential of introducing unnecessary competition, versus CYOD, in which everyone’s equal and there aren’t any potential downloading issues or security breaches.  According to a Forcepoint study, “70 percent of millennials admit to using unprotected Wi-Fi connections, 32 percent download unauthorized apps, and 422 percent use the same password across all apps.”  That’s a lot of downloading and vulnerability to consider.

***************

The way of the future is coming: whether it be automation, IoT, biometrics, or new computer virus strains, we must be ready to defend against the hackers of tomorrow.  What mobile security trends do you think will take off in the business world, over the next ten years?  Share your thoughts in the comments section, below.

MORE FROM BIG DATA MADE SIMPLE