Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Career Intelligence
    • Cyber Tactics
    • Cybersecurity Education & Training
    • Leadership & Management
    • Security Talk
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Interactive Spotlight
    • Photo Galleries
    • Podcasts
    • Polls
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!
Cybersecurity News

Top 5 Pitfalls to Avoid in BYOD Security

By Pankaj Gupta
August 27, 2013

So, you are the CSO, CIO or CISO of an organization that is embracing BYOD (Bring Your Own device) for its flexibility and efficiency benefits, but you have that nagging worry about what this means to the security and compliance needs of the enterprise. Your instincts are correct. Keep an eye out for the following five major pitfalls in BYOD policy building:

Pitfall #1: “BYOD doesn't mean bring ANY device… right?”

Many companies launch BYOD programs and allow devices that can't be easily protected. Some versions of Android and iOS devices don't have enough built-in security for compliance and data protection. Setting minimum OS version thresholds for users to bring in their own devices for work is a baseline requirement to protect corporate data and apps running on them. When a mobile device is compromised, you cannot safely allow it to connect to the corporate network and it could expose the organization to malware and virus attacks.

You should require upgrading to the latest Android version before allowing corporate network access. This can help mitigate more than three-fourths of existing Android malware threats. To simplify management, you may need to restrict the types of devices supported by the BYOD program, so that you don’t end up spinning your wheels trying to support an outdated phone.

Pitfall #2: Lax User Access Control Policies

Authentication and access control mechanisms have been around since the mainframe days and have evolved through shifts to mobile devices. Carelessness of the user who leaves the device open without a password in a public place can compromise sensitive business information. Sometimes the users are not savvy enough to grant only the minimum necessary permissions to applications added to the mobile device, exposing stored business data on the device to unauthorized access.

Stronger authentication must be encouraged by managing and enforcing password policies. Two-factor authentication should be required before access to corporate networks. User profiles with access rights and restrictions need to be defined using the principle of least privilege. Processes should be put in place for catching exceptions, alerting management upon violations and automatic remediation.

Pitfall #3: Public Wi-Fi and Lack of Data Protection

Public Wi-Fi is dangerous business because your communications are not protected. Standard configuration settings will need to be enforced for enterprise access, including the use of an encrypted network and data access only via VPN and secure HTTPS sessions.

To protect your data, you need to encrypt sensitive information with strong keys as soon as it is acquired, so there is no data traffic in the clear. Data at rest in storage, servers and devices as well as data on the wire (and over the air) should remain encrypted as it is used, stored or moved and eventually decrypted only by the intended receiver.

Pitfall #4: Using the Same Policy for Work and Home

The mobile security policies need to be sufficient to protect sensitive information, ensure productivity and meet compliance requirements. For example, the ability to define time and location windows with access restrictions, including what apps can be run and what apps cannot be run within the boundaries gives you tighter control. For example, your employee might be a wizard at Angry Birds at home, but within business hours, the device would not be able to access that app, keeping the focus on work-related productivity.

Then you can use geo-fencing to monitor and enforce location-based access and usage policies at work locations. You’ll want to make sure that the GPS and location tracking features persist within geo-fence boundaries even when a user turns GPS off.

You need the visibility to track where devices are, where they’ve been, and where they are going at any point in time and have the capability to remotely lock and wipe content, apps and passwords on lost or stolen devices.

Without continuous monitoring, following up on exceptions and alerts, and automated or manual remediation actions, policy compliance can’t be achieved. Are dashboards being monitored? Are reports being generated and reviewed by appropriate personnel? Are alerts being simply ignored? Do you have exception handling, remediation, escalation and audit processes in place? With strong policies, monitoring and enforcement, you can detect and stop misuse, respond to violations and compliance issues and quickly remediate.

Pitfall #5: Ignoring Apps Data and Usage

If you have sensitive data, you need a private enterprise app store for managing your internally developed custom apps, and customized apps that you buy from ISVs and cloud service providers. You should also take control of apps – pushing mandatory apps, blacklisting rogue or time-wasting apps, and whitelisting recommended apps that employees can easily discover and use.

Don’t ignore usage. Usage monitoring, threshold-based alerts and analytics can help uncover misuse, security exposures and prevent cost overruns due to excessive data bandwidth usage or unexpected international roaming charges. After policy threshold levels are set up, you can alert users upon exceptions and monitor patterns to forestall security breaches or attacks.

KEYWORDS: Bring Your Own Device (BYOD) smartphone security smartpone access

Share This Story

Looking for a reprint of this article?
From high-res PDFs to custom plaques, order your copy today!

Pankaj Gupta, Founder, CEO, Chief Architect at Amtel

Recommended Content

JOIN TODAY
To unlock your recommendations.

Already have an account? Sign In

  • Iintegration and use of emerging tools

    Future Proof Your Security Career with AI Skills

    AI’s evolution demands security leaders master...
    Security Education & Training
    By: Jerry J. Brennan and Joanne R. Pollock
  • The 2025 Security Benchmark Report

    The 2025 Security Benchmark Report

    The 2025 Security Benchmark Report surveys enterprise...
    The Security Benchmark Report
    By: Rachelle Blair-Frasier
  • The Most Influential People in Security 2025

    Security’s Most Influential People in Security 2025

    Security Magazine’s 2025 Most Influential People in...
    Most Influential People in Security
    By: Security Staff
Manage My Account
  • Security Newsletter
  • eMagazine Subscriptions
  • Manage My Preferences
  • Online Registration
  • Mobile App
  • Subscription Customer Service

More Videos

Sponsored Content

Sponsored Content is a special paid section where industry companies provide high quality, objective, non-commercial content around topics of interest to the Security audience. All Sponsored Content is supplied by the advertising company and any opinions expressed in this article are those of the author and not necessarily reflect the views of Security or its parent company, BNP Media. Interested in participating in our Sponsored Content section? Contact your local rep!

close
  • critical event management
    Sponsored byEverbridge

    Why a Unified View Across IT, Continuity, and Security Makes or Breaks Crisis Response

  • Charlotte Star Room
    Sponsored byAMAROK

    In an Uncertain Economy, Security Is a Necessity - Not an Afterthought

  • Sureview screen
    Sponsored bySureView Systems

    The Evolution of Automation in the Command Center

Popular Stories

The Lourve

The Lourve Heist: What Was the State of the Museum’s Security?

The 2025 Security Benchmark Report

The 2025 Security Benchmark Report

Office supplies

Security Leaders Share Why 77% Organizations Lose Data Due to Insider Risks

American Airlines

Security Leaders Discuss Cyberattack on American Airlines Subsidiary

Going Down with the Ship

Going Down with the Ship

Top Cybersecurity Leaders

Events

September 18, 2025

Security Under Fire: Insights on Active Shooter Preparedness and Recovery

ON DEMAND: In today’s complex threat environment, active shooter incidents demand swift, coordinated and well-informed responses.

November 13, 2025

Inside the 2025 Security Benchmark Report

The 2025 Security Benchmark Report unveils the top trends CSOs and enterprise security executives are facing in today’s current climate and how each of these trends could potentially impact the enterprise’s global reputation with the public, governments, and business partners. 

View All Submit An Event

Products

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products

Related Articles

  • power-plant-energy-freepik

    Top 5 security threats for power plants and how to proactively avoid them

    See More
  • IT-fail

    5 Common Pitfalls in IT Security & How to Overcome Them

    See More
  • leadership-enews2

    How to Avoid Intelligence Program Pitfalls

    See More

Related Products

See More Products
  • security culture.webp

    Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

  • Hospitality Security: Managing Security in Today's Hotel, Lodging, Entertainment, and Tourism Environment

  • A Leaders Guide Book Cover_Nicholson_29Sept2023.jpg

    A Leader’s Guide to Evaluating an Executive Protection Program

See More Products
×

Sign-up to receive top management & result-driven techniques in the industry.

Join over 20,000+ industry leaders who receive our premium content.

SIGN UP TODAY!
  • RESOURCES
    • Advertise
    • Contact Us
    • Store
    • Want More
  • SIGN UP TODAY
    • Create Account
    • eMagazine
    • Newsletter
    • Customer Service
    • Manage Preferences
  • SERVICES
    • Marketing Services
    • Reprints
    • Market Research
    • List Rental
    • Survey/Respondent Access
  • STAY CONNECTED
    • LinkedIn
    • Facebook
    • YouTube
    • X (Twitter)
  • PRIVACY
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2025. All Rights Reserved BNP Media.

Design, CMS, Hosting & Web Development :: ePublishing