Bring Your Own Device SMB Security Policy Guidelines

If you are looking for tips on how to develop your bring-your-own-device (BYOD) security policy, SearchConsumerization has put together a series of best practices and considerations which we summarize below with a few additions:

  • Encrypt devices and/or folders that contain business data
  • Always download the latest software, security and app updates
  • Register all devices before allowing them access to your network
  • Authenticate devices using Secure Sockets Layer certificates (SSL)
  • Use software with the ability to remotely lock or wipe a personal device that is lost or stolen
  • Consider app blacklisting specific applications
  • Enforce user data access controls
  • Ensure your policy is in line with all industry standards and requirements
  • Run employees through training on reporting lost devices, use of email, and other data best practices

No matter what device your employees are using, it only takes one solution to manage them all. And at Outhouse IT we can help you automate the employee mobile device enrollment process, install / remove apps (by user / device status / role), send commands that control roaming or status, monitor encryption status, send messages to users and lock / wipe lost devices. And most importantly take the headache of worrying about employees bringing their own technology into the workplace, out of your hands.