By now you’ve heard of “Bring your own device” (aka BYOD), so you know it’s all about employees using their own phones and tablets to access corporate applications and data. For employees, BYOD presents an opportunity to increase efficiency, flexibility, and job satisfaction. For IT, it presents numerous management and security challenges. In an office that allows BYOD, a good people-centric IT policy mitigates those security concerns.
The top BYOD security concern is data leakage—the risk of business data accidentally crossing over to a user’s personal data and “leaking” into the world. Although it’s convenient to carry your office in your pocket, data leakage can be like a tear in that pocket where sensitive data can slip out. The first step toward mitigating this risk is to refocus your IT strategy by focusing on how people use their devices, not the devices themselves.
Microsoft has been cooking up an integrated solution to help your IT teams make the transition from a “device-centric” IT management system, where all devices are corporate owned and provisioned, to a “people-centric” one, where employees can choose their own device and work from different locations. This solution can be broken down into 3 essential steps:
1) Register: The first step is to make sure that all devices are accounted for by your business’ IT department. Employees register their devices so that IT can configure “conditional access policies,” according to the type of device and user’s identity. This helps track devices and identify potential leaks.
2) Enroll: Once employees are registered, they can enroll their devices for “management.” At this point the company portal is installed on the device, enabling access to applications and data. This makes sure the device complies with your existing corporate security policies.
3) Secure Access: Employees need to access their corporate desktop and applications from their personal or corporate devices, from both internal and external locations. A secure infrastructure solution gives your employees a way to use their devices without fear of a breach in your security.
Data leaked, whether intentional or accidental, is a major security breach for businesses. Now that sensitive information can be accessed from any device, the chances of a data leak are even greater. As more and more businesses embrace a BYOD and CYOD (“choose your own device”) policy, they need to take the necessary precautions to make sure the lines of separation for data stay in place while supporting their employees’ mobile work styles.
Learn more about Microsoft’s approach to empowering People-Centric IT!