Page 46 - Payout Magazine Online Volume 9.1
P. 46

Cyber Risks  The risks associated with a Bring Your Own Device policy
for Workplace           hasn’t stopped companies from taking advantage of the many
                   benefits BYOD brings. However, despite the versatility of allowing
   BYOD Policies   employees to use their own devices at work, or remotely at home,
                   there are security challenges which need to be overcome to
                   maintain a safe but also convenient working environment.

                       Every organization will have different requirements, meaning a
                   BYOD policy will be unique to a company’s situation. When BYOD
                   first became a reality, employees loved the idea of working with
                   devices with which they were familiar. Unfortunately, it wasn’t long
                   before every device used for work became a potential target for
                   hackers and a back door towards gaining access to mission-
                   critical corporate data.

                       The Cisco Annual Report reveals that the majority of IT
                   managers favor BYOD policies in the workplace. The extra
                   productivity equates to each worker saving approximately 81
                   minutes per week when using their own devices - a significant
                   number when factored into an organization with hundreds of
                   employees.

                       However, careful consideration when developing policies and
                   procedures is needed to ensure a BYOD policy does not put the
                   company or its employees at risk from cyber-attacks. Here are
                   the top security challenges faced by organizations when adopting
                   a BYOD policy.

                   1.	 Neglecting Password Protection

                       Many users will opt out of adding a secure login to their
                   devices because having to type in a password every time they
                   use the device is deemed inconvenient or an annoyance.

                       Even when passwords are used, however, they are often
                   simple and easy for hackers to brute force their way through.

                       Naturally, devices without secure passwords are easily
                   compromised and create one of the most common security risks
                   for BYOD.

                   2.	 Downloading Malicious Apps

                       In November 2018, Google released a list of 13 malicious
                   malware apps it had discovered in the Google Play Store. While
                   Google has removed the offending apps, there are many phones
                   which will have them installed still.

                       Unfortunately, this sort of activity is happening every day, with
                   Google mostly playing catch up because they are unable to stop
                   the practice altogether.

                       Malicious apps can take over a device and transmit information
                   such as passwords, account details, and sensitive company data.

                       The most common type of malware found on mobile devices
                   are ‘free versions,” which have embedded code that allow an
                   unauthorized person to use the phone remotely for their own

46 PayOutMagazine
   41   42   43   44   45   46   47   48   49   50   51