Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Career Intelligence
    • Cyber Tactics
    • Cybersecurity Education & Training
    • Leadership & Management
    • Security Talk
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Interactive Spotlight
    • Photo Galleries
    • Podcasts
    • Polls
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!
Cybersecurity News

Reducing Risk: How to Make BYOD Safer

By Israel Lifshitz
April 28, 2015

Day in, day out, IT professionals work at getting data security to catch up to the speed of business, or at least reduce the gap as much as possible. The trials and tribulations they face in dealing with enterprise BYOD  (Bring Your Own Device) security risks is a great example of this ongoing and ever-evolving field.

New threats, vulnerabilities and gaps in business processes are being discovered constantly that add layers of complexity, while new solutions are being proposed with almost the same breakneck frequency. There’s never a dull day in the world of security, especially when enterprise mobility architecture must also enable balanced BYOD programs that equip professionals with the tools necessary to respond, collaborate and produce at a more efficient clip.

But within the most ambitious of problems often lies the best solutions, and very valuable do’s and don’ts are emerging that all IT leaders can and should be implementing for their BYOD plans:

1. Minimize the amount of data on devices

The more mobile our workforce becomes and the greater the reliance on mobile app access, the need to focus security of corporate data away from devices is becoming clearer. Mobile security becomes more straight-forward when the most important asset needing protection – sensitive corporate data – is separated from the myriad of personally-owned devices and operating systems that connect to your network. Inherently the weakest link in security, smartphones and tablets require constant patching to deal with malicious attacks and vulnerabilities. Aside from the IT overhead demanded by device management, the level of security afforded from enterprise mobility management (EMM) tools exclusively has a ceiling, while mobile data seems to know no bounds. Virtualized enterprise mobility approaches have emerged which enable data management from a secured data center.

2. Reduce connections and protocols that connect to your network via devices

Remote access should be granted as much as possible using a secured and encrypted connection. Requiring users to connect via a VPN connection is an absolute must in order to permit secured connections between mobile devices and your corporate network. Using a VPN service ensures that you only have one gatekeeper verifying that all of the data being transferred from the device is encrypted and being sent to the appropriate recipient server. Anyone viewing your data in transit will see strings of unintelligible text.

3. Use advanced secure connection techniques

To verify data in-transit from mobile apps is secure make sure you are using the latest encryption standards. Modern cryptographic protocols such as TLS (Transport Layer Security) 1.2 have less vulnerabilities. Additionally some new techniques such as certificate or SSL pinning also reduce risks. Implementing these standards adds protection from man-in-the-middle (MITM) attacks. Certificate pinning lets you validate the certificate and confirm that the server requesting entry matches the hostname and has not been intercepted along the way. Many consumer apps regularly used by telecommuters don’t properly implement these techniques, so it’s important that IT does so to ensure a higher level of security.

4. Use One-Time Passwords (OTP)

In addition to phishing and MITM attacks, keyboard logging is another technique that is often used to record passwords and login credentials in order to penetrate a network. To guard against this, use unique and temporary passwords for each time a user logs into a session. Combine this with a smartphone passcode to reinforce authentication processes.

5. Don’t support rooted and jail-broken devices

This should be universal by now, but you’d be surprised how many organizations have still not nipped this issue in the bud. With all of the mobile malware and other vulnerabilities already faced by secured mobile devices, why would you even consider allowing compromised devices to have access to your enterprise data?

6. Incorporate BYOD security education into onboarding and employee communications

No matter how carefully you construct your BYOD policy, it will only be as successful as the engagement it receives from your employees. You drill codes of conduct and fire and safety procedures with new hires; the safety of your data is just as important. Incorporating employee education from the start of their journey with your company and keeping them updated on the importance of using security best practices is an investment that will pay off long-term. Taking them through your BYOD policy during on-boarding is a good start, but don’t just leave it at that. As new security risks and considerations emerge, arm pertinent department heads with practical takeaways they can share with users. Over time, you’ll see more of them actually being used, as well as an improvement in BYOD compliance.

KEYWORDS: Bring Your Own Device (BYOD) data management data security

Share This Story

Looking for a reprint of this article?
From high-res PDFs to custom plaques, order your copy today!

Israel Lifshitz is the CEO of Nubo Software, a company that provides a virtual mobile infrastructure solution. Prior to launching BYOD platform Nubo he founded SysAid Technologies, a worldwide leader in IT service management solutions.

Recommended Content

JOIN TODAY
To unlock your recommendations.

Already have an account? Sign In

  • Iintegration and use of emerging tools

    Future Proof Your Security Career with AI Skills

    AI’s evolution demands security leaders master...
    Columns
    By: Jerry J. Brennan and Joanne R. Pollock
  • The 2025 Security Benchmark Report

    The 2025 Security Benchmark Report

    The 2025 Security Benchmark Report surveys enterprise...
    The Security Benchmark Report
    By: Rachelle Blair-Frasier
  • The Most Influential People in Security 2025

    Security’s Most Influential People in Security 2025

    Security Magazine’s 2025 Most Influential People in...
    Most Influential People in Security
    By: Security Staff
Manage My Account
  • Security Newsletter
  • eMagazine Subscriptions
  • Manage My Preferences
  • Online Registration
  • Mobile App
  • Subscription Customer Service

More Videos

Sponsored Content

Sponsored Content is a special paid section where industry companies provide high quality, objective, non-commercial content around topics of interest to the Security audience. All Sponsored Content is supplied by the advertising company and any opinions expressed in this article are those of the author and not necessarily reflect the views of Security or its parent company, BNP Media. Interested in participating in our Sponsored Content section? Contact your local rep!

close
  • critical event management
    Sponsored byEverbridge

    Why a Unified View Across IT, Continuity, and Security Makes or Breaks Crisis Response

  • Charlotte Star Room
    Sponsored byAMAROK

    In an Uncertain Economy, Security Is a Necessity - Not an Afterthought

  • Sureview screen
    Sponsored bySureView Systems

    The Evolution of Automation in the Command Center

Popular Stories

Red laptop

Security Leaders Discuss SitusAMC Cyberattack

Cybersecurity trends of 2025

3 Top Cybersecurity Trends from 2025

Green code

Logitech Confirms Data Breach, Security Leaders Respond

Neon human and android hands

65% of the Forbes AI 50 List Leaked Sensitive Information

Cybersecurity predictions of 2026

5 Cybersecurity Predictions for 2026

Top Cybersecurity Leaders

Events

September 18, 2025

Security Under Fire: Insights on Active Shooter Preparedness and Recovery

ON DEMAND: In today’s complex threat environment, active shooter incidents demand swift, coordinated and well-informed responses.

December 11, 2025

Responding to Evolving Threats in Retail Environments

Retail security professionals are facing an increasingly complex array of security challenges — everything from organized retail crime to evolving cyber-physical threats and public safety concerns.

View All Submit An Event

Products

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products

Related Articles

  • cloud-enews

    How to Make Informed Risk Management Decisions about What to Store in the Cloud

    See More
  • risk-management-freepik1170x658v568.jpg

    How to make third-party risk management recession-proof in 2023

    See More
  • SEC0820-Data-Feat-slide1_900px.jpg

    Using chip technology to make data sharing safer in financial services

    See More

Related Products

See More Products
  • security culture.webp

    Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

  • school security.jpg

    School Security: How to Build and Strengthen a School Safety Program

  • Risk Analysis and the Security Survey, 4th Edition

See More Products
×

Sign-up to receive top management & result-driven techniques in the industry.

Join over 20,000+ industry leaders who receive our premium content.

SIGN UP TODAY!
  • RESOURCES
    • Advertise
    • Contact Us
    • Store
    • Want More
  • SIGN UP TODAY
    • Create Account
    • eMagazine
    • Newsletter
    • Customer Service
    • Manage Preferences
  • SERVICES
    • Marketing Services
    • Reprints
    • Market Research
    • List Rental
    • Survey/Respondent Access
  • STAY CONNECTED
    • LinkedIn
    • Facebook
    • YouTube
    • X (Twitter)
  • PRIVACY
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2025. All Rights Reserved BNP Media.

Design, CMS, Hosting & Web Development :: ePublishing