{"id":34093,"date":"2019-04-09T12:36:34","date_gmt":"2019-04-09T16:36:34","guid":{"rendered":"http:\/\/www.andysowards.com\/blog\/?p=34093"},"modified":"2019-04-09T12:36:48","modified_gmt":"2019-04-09T16:36:48","slug":"fostering-network-security-byod-world","status":"publish","type":"post","link":"https:\/\/www.andysowards.com\/blog\/2019\/fostering-network-security-byod-world\/","title":{"rendered":"Fostering Network Security in a BYOD World"},"content":{"rendered":"<p>From the continuous escape from the 9-5 working schedules to the increase in technological advancements, it is almost impossible for businesses to ignore the need for BYOD policies. Slowly, employees are finding it easier to use personal devices to do work-related tasks instead of relying on company-provided devices. Not only is this convenient for them, but it also improves productivity as they know their personal devices better than those provided by their bosses.<\/p>\n<p><img decoding=\"async\" data-src=\"https:\/\/www.andysowards.com\/blog\/assets\/byod-security-business-networking-1024x680.jpg\" alt=\"byod-security-business-networking\" width=\"1024\" height=\"680\" class=\"alignnone size-large wp-image-34094 lazyload\" data-srcset=\"https:\/\/www.andysowards.com\/blog\/assets\/byod-security-business-networking-1024x680.jpg 1024w, https:\/\/www.andysowards.com\/blog\/assets\/byod-security-business-networking-768x510.jpg 768w, https:\/\/www.andysowards.com\/blog\/assets\/byod-security-business-networking.jpg 1280w\" data-sizes=\"(max-width: 1024px) 100vw, 1024px\" src=\"data:image\/svg+xml;base64,PHN2ZyB3aWR0aD0iMSIgaGVpZ2h0PSIxIiB4bWxucz0iaHR0cDovL3d3dy53My5vcmcvMjAwMC9zdmciPjwvc3ZnPg==\" style=\"--smush-placeholder-width: 1024px; --smush-placeholder-aspect-ratio: 1024\/680;\" \/><br \/>\n<em><a href=\"https:\/\/cdn.pixabay.com\/photo\/2015\/02\/02\/11\/09\/office-620822_1280.jpg\" rel=\"noopener\" target=\"_blank\">Image Source<\/a><\/em><\/p>\n<p>Even better, the cost benefit of not having to provide workplace devices to employees can be quite inviting to most businesses. Sadly, one in every five businesses lacks enough visibility into the aspects of the business they are using their mobile devices to access, according to Global News Wire, which breeds a cyber-security threat. Other than increasing the chances of insider threat, this might also leave your organization vulnerable to malware.<\/p>\n<p>Here is how to build a secure network to avoid these risks:<\/p>\n<h2>Audit Your Landscape Before Accepting BYOD<\/h2>\n<p><a target=\"_blank\" href=\"https:\/\/www.dnsstuff.com\/network-monitoring-software\">Network monitoring tools<\/a>, log management tools, and firewalls, can all play a pivotal role in stopping any cyber threat from leading to the downfall of your organization. Sadly, lacking such investments or having some that need patches will only leave you exposed to security threats. On the other hand, the threat spectrum widens if you embrace BYOD without necessarily solving the problems with your current security infrastructure.<\/p>\n<p>Before considering BYOD policies, ensure that you have solved these specific security loopholes. You can work with security professionals such as pen testers to help identify any issues that need to be fixed.<\/p>\n<h2>Invest In Mobile Device Management Systems<\/h2>\n<p>BYOD might leave you in a catch-22 situation. While you might want to have enough visibility into what your employee is doing with corporate data, you do not want to deal with a lawsuit from accessing private employee data. Luckily, mobile device management technology helps diffuse this dilemma.<\/p>\n<p>It allows you to not only differentiate company data from the employee\u2019s personal data, but it also improves the level of visibility you have towards your corporate data. Additionally, it can be pivotal in deleting corporate data once employees go rogue, lose their phones or simply leave your company. From the employee\u2019s perspective, this also helps limit sharing corporate data accidentally.<\/p>\n<h2>Embrace Role-Based Access Control<\/h2>\n<p><a href=\"https:\/\/medium.com\/jettech\/role-based-access-control-using-a-graph-database-2573debb685e\" target=\"_blank\"><img decoding=\"async\" data-src=\"https:\/\/www.andysowards.com\/blog\/assets\/role-based-access-control-using-a-graph-database-1024x671.jpeg\" alt=\"role-based-access-control-using-a-graph-database\" width=\"1024\" height=\"671\" class=\"alignnone size-large wp-image-34096 lazyload\" data-srcset=\"https:\/\/www.andysowards.com\/blog\/assets\/role-based-access-control-using-a-graph-database-1024x671.jpeg 1024w, https:\/\/www.andysowards.com\/blog\/assets\/role-based-access-control-using-a-graph-database-768x503.jpeg 768w, https:\/\/www.andysowards.com\/blog\/assets\/role-based-access-control-using-a-graph-database.jpeg 1600w\" data-sizes=\"(max-width: 1024px) 100vw, 1024px\" src=\"data:image\/svg+xml;base64,PHN2ZyB3aWR0aD0iMSIgaGVpZ2h0PSIxIiB4bWxucz0iaHR0cDovL3d3dy53My5vcmcvMjAwMC9zdmciPjwvc3ZnPg==\" style=\"--smush-placeholder-width: 1024px; --smush-placeholder-aspect-ratio: 1024\/671;\" \/><\/a><br \/>\n<em>Role-Based Access Control Using a Graph Database<\/em><\/p>\n<p>Access to corporate data should be on a need to know basis. An employee shouldn\u2019t have access to the same data as an executive member of the board. Furthermore, certain aspects of data access such as file sharing might not be ideal for the BYOD world, as this can easily lead to insider data theft.<\/p>\n<p>Invest in the right tools to embrace role-based access control. On the flip side, you can also manage access control based on the profile of the requester. If the person seems to be on a personal device, then certain<a target=\"_blank\" href=\"https:\/\/www.computerweekly.com\/opinion\/What-IT-managers-need-to-know-about-risky-file-sharing\"> aspects like risky-file sharing<\/a> ought to be disabled for them.<\/p>\n<h2>Embrace Two-Factor Authentication<\/h2>\n<p>While passwords might fall into the wrong hands, personal devices can easily get stolen or lost. If hackers gain access to them, the chances are that your business\u2019s data will be compromised. As such,<a target=\"_blank\" href=\"https:\/\/www.csoonline.com\/article\/2129647\/access-control\/100982-Top-two-factor-authentication-tools\"> embrace two-factor verification<\/a> to ensure that employees need two keys (password and a device) to gain access into your network.<\/p>\n<p><img decoding=\"async\" data-src=\"https:\/\/www.andysowards.com\/blog\/assets\/byod-security-business-networking-internet-data-secure-1024x614.jpg\" alt=\"byod-security-business-networking-internet-data-secure\" width=\"1024\" height=\"614\" class=\"alignnone size-large wp-image-34095 lazyload\" data-srcset=\"https:\/\/www.andysowards.com\/blog\/assets\/byod-security-business-networking-internet-data-secure-1024x614.jpg 1024w, https:\/\/www.andysowards.com\/blog\/assets\/byod-security-business-networking-internet-data-secure-768x461.jpg 768w, https:\/\/www.andysowards.com\/blog\/assets\/byod-security-business-networking-internet-data-secure.jpg 1280w\" data-sizes=\"(max-width: 1024px) 100vw, 1024px\" src=\"data:image\/svg+xml;base64,PHN2ZyB3aWR0aD0iMSIgaGVpZ2h0PSIxIiB4bWxucz0iaHR0cDovL3d3dy53My5vcmcvMjAwMC9zdmciPjwvc3ZnPg==\" style=\"--smush-placeholder-width: 1024px; --smush-placeholder-aspect-ratio: 1024\/614;\" \/><br \/>\n<em><a href=\"https:\/\/cdn.pixabay.com\/photo\/2018\/02\/16\/10\/52\/beverage-3157395_1280.jpg\" rel=\"noopener\" target=\"_blank\">Image Source<\/a><\/em><\/p>\n<p>In most cases, two-factor verification combines both a device or message and a password to grant access to the requester. Ideally, having all employees use this can limit the chances of a data breach from having a device lost or the misplacement of a password. However, you should still train employees on key password management procedures to avoid any consequences.<\/p>\n<h2>Conclusion<\/h2>\n<p>BYOD offers too many benefits to be ignored, but the risks aren&#8217;t inviting at all. Luckily, the success rate of your BYOD policy trickles down to the network security strategy you choose. \u00a0Consider the tips above to enjoy BYOD without the risks.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>From the continuous escape from the 9-5 working schedules to the increase in technological advancements, it is almost impossible for businesses to ignore the need for BYOD policies. Slowly, employees<\/p>\n","protected":false},"author":1,"featured_media":34096,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_bbp_topic_count":0,"_bbp_reply_count":0,"_bbp_total_topic_count":0,"_bbp_total_reply_count":0,"_bbp_voice_count":0,"_bbp_anonymous_reply_count":0,"_bbp_topic_count_hidden":0,"_bbp_reply_count_hidden":0,"_bbp_forum_subforum_count":0,"footnotes":""},"categories":[109,1],"tags":[5891,7860,360,311,6020,974,6249,6116,10094,6207,2511,5368,988,256,5961,866,20,10096,9273,216,9652,1136,5111,10095,177,5986,5879,21,115,620,2896],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v23.5 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Fostering Network Security in a BYOD World<\/title>\n<meta name=\"description\" content=\"From the continuous escape from the 9-5 working schedules to the increase in technological advancements, it is almost impossible for businesses to ignore\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.andysowards.com\/blog\/2019\/fostering-network-security-byod-world\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Fostering Network Security in a BYOD World\" \/>\n<meta property=\"og:description\" content=\"From the continuous escape from the 9-5 working schedules to the increase in technological advancements, it is almost impossible for businesses to ignore\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.andysowards.com\/blog\/2019\/fostering-network-security-byod-world\/\" \/>\n<meta property=\"og:site_name\" content=\"Daily Business Resources for Entrepreneurs, Web Designers, &amp; Creatives by Andy Sowards\" \/>\n<meta property=\"article:publisher\" content=\"http:\/\/facebook.com\/andysowardsfan\" \/>\n<meta property=\"article:published_time\" content=\"2019-04-09T16:36:34+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2019-04-09T16:36:48+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.andysowards.com\/blog\/assets\/role-based-access-control-using-a-graph-database.jpeg\" \/>\n\t<meta property=\"og:image:width\" content=\"1600\" \/>\n\t<meta property=\"og:image:height\" content=\"1048\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Andy Sowards\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@andysowards\" \/>\n<meta name=\"twitter:site\" content=\"@andysowards\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Andy Sowards\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.andysowards.com\/blog\/2019\/fostering-network-security-byod-world\/\",\"url\":\"https:\/\/www.andysowards.com\/blog\/2019\/fostering-network-security-byod-world\/\",\"name\":\"Fostering Network Security in a BYOD World\",\"isPartOf\":{\"@id\":\"https:\/\/www.andysowards.com\/blog\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.andysowards.com\/blog\/2019\/fostering-network-security-byod-world\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.andysowards.com\/blog\/2019\/fostering-network-security-byod-world\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.andysowards.com\/blog\/assets\/role-based-access-control-using-a-graph-database.jpeg\",\"datePublished\":\"2019-04-09T16:36:34+00:00\",\"dateModified\":\"2019-04-09T16:36:48+00:00\",\"author\":{\"@id\":\"https:\/\/www.andysowards.com\/blog\/#\/schema\/person\/2e0f72bd7f6497fd883e2bd67d9f3415\"},\"description\":\"From the continuous escape from the 9-5 working schedules to the increase in technological advancements, it is almost impossible for businesses to ignore\",\"breadcrumb\":{\"@id\":\"https:\/\/www.andysowards.com\/blog\/2019\/fostering-network-security-byod-world\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.andysowards.com\/blog\/2019\/fostering-network-security-byod-world\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.andysowards.com\/blog\/2019\/fostering-network-security-byod-world\/#primaryimage\",\"url\":\"https:\/\/www.andysowards.com\/blog\/assets\/role-based-access-control-using-a-graph-database.jpeg\",\"contentUrl\":\"https:\/\/www.andysowards.com\/blog\/assets\/role-based-access-control-using-a-graph-database.jpeg\",\"width\":1600,\"height\":1048},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.andysowards.com\/blog\/2019\/fostering-network-security-byod-world\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.andysowards.com\/blog\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Fostering Network Security in a BYOD World\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.andysowards.com\/blog\/#website\",\"url\":\"https:\/\/www.andysowards.com\/blog\/\",\"name\":\"Daily Business Resources for Entrepreneurs, Web Designers, &amp; Creatives by Andy Sowards\",\"description\":\"Design Inspiration &amp; Business Resources for Creatives\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.andysowards.com\/blog\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.andysowards.com\/blog\/#\/schema\/person\/2e0f72bd7f6497fd883e2bd67d9f3415\",\"name\":\"Andy Sowards\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.andysowards.com\/blog\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/15f95b011563b5894883b22bd4b32d59?s=96&r=pg\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/15f95b011563b5894883b22bd4b32d59?s=96&r=pg\",\"caption\":\"Andy Sowards\"},\"description\":\"Im a professional Freelancer specializing in Web Developer, Design, Programming web applications. Im an Avid member of the Design\/Development community and a Serial Blogger. follow me on Twitter @AndySowards\",\"sameAs\":[\"https:\/\/www.andysowards.com\"],\"url\":\"https:\/\/www.andysowards.com\/blog\/author\/admin\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Fostering Network Security in a BYOD World","description":"From the continuous escape from the 9-5 working schedules to the increase in technological advancements, it is almost impossible for businesses to ignore","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.andysowards.com\/blog\/2019\/fostering-network-security-byod-world\/","og_locale":"en_US","og_type":"article","og_title":"Fostering Network Security in a BYOD World","og_description":"From the continuous escape from the 9-5 working schedules to the increase in technological advancements, it is almost impossible for businesses to ignore","og_url":"https:\/\/www.andysowards.com\/blog\/2019\/fostering-network-security-byod-world\/","og_site_name":"Daily Business Resources for Entrepreneurs, Web Designers, &amp; Creatives by Andy Sowards","article_publisher":"http:\/\/facebook.com\/andysowardsfan","article_published_time":"2019-04-09T16:36:34+00:00","article_modified_time":"2019-04-09T16:36:48+00:00","og_image":[{"width":1600,"height":1048,"url":"https:\/\/www.andysowards.com\/blog\/assets\/role-based-access-control-using-a-graph-database.jpeg","type":"image\/jpeg"}],"author":"Andy Sowards","twitter_card":"summary_large_image","twitter_creator":"@andysowards","twitter_site":"@andysowards","twitter_misc":{"Written by":"Andy Sowards","Est. reading time":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/www.andysowards.com\/blog\/2019\/fostering-network-security-byod-world\/","url":"https:\/\/www.andysowards.com\/blog\/2019\/fostering-network-security-byod-world\/","name":"Fostering Network Security in a BYOD World","isPartOf":{"@id":"https:\/\/www.andysowards.com\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.andysowards.com\/blog\/2019\/fostering-network-security-byod-world\/#primaryimage"},"image":{"@id":"https:\/\/www.andysowards.com\/blog\/2019\/fostering-network-security-byod-world\/#primaryimage"},"thumbnailUrl":"https:\/\/www.andysowards.com\/blog\/assets\/role-based-access-control-using-a-graph-database.jpeg","datePublished":"2019-04-09T16:36:34+00:00","dateModified":"2019-04-09T16:36:48+00:00","author":{"@id":"https:\/\/www.andysowards.com\/blog\/#\/schema\/person\/2e0f72bd7f6497fd883e2bd67d9f3415"},"description":"From the continuous escape from the 9-5 working schedules to the increase in technological advancements, it is almost impossible for businesses to ignore","breadcrumb":{"@id":"https:\/\/www.andysowards.com\/blog\/2019\/fostering-network-security-byod-world\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.andysowards.com\/blog\/2019\/fostering-network-security-byod-world\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.andysowards.com\/blog\/2019\/fostering-network-security-byod-world\/#primaryimage","url":"https:\/\/www.andysowards.com\/blog\/assets\/role-based-access-control-using-a-graph-database.jpeg","contentUrl":"https:\/\/www.andysowards.com\/blog\/assets\/role-based-access-control-using-a-graph-database.jpeg","width":1600,"height":1048},{"@type":"BreadcrumbList","@id":"https:\/\/www.andysowards.com\/blog\/2019\/fostering-network-security-byod-world\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.andysowards.com\/blog\/"},{"@type":"ListItem","position":2,"name":"Fostering Network Security in a BYOD World"}]},{"@type":"WebSite","@id":"https:\/\/www.andysowards.com\/blog\/#website","url":"https:\/\/www.andysowards.com\/blog\/","name":"Daily Business Resources for Entrepreneurs, Web Designers, &amp; Creatives by Andy Sowards","description":"Design Inspiration &amp; Business Resources for Creatives","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.andysowards.com\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Person","@id":"https:\/\/www.andysowards.com\/blog\/#\/schema\/person\/2e0f72bd7f6497fd883e2bd67d9f3415","name":"Andy Sowards","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.andysowards.com\/blog\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/15f95b011563b5894883b22bd4b32d59?s=96&r=pg","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/15f95b011563b5894883b22bd4b32d59?s=96&r=pg","caption":"Andy Sowards"},"description":"Im a professional Freelancer specializing in Web Developer, Design, Programming web applications. Im an Avid member of the Design\/Development community and a Serial Blogger. follow me on Twitter @AndySowards","sameAs":["https:\/\/www.andysowards.com"],"url":"https:\/\/www.andysowards.com\/blog\/author\/admin\/"}]}},"amp_enabled":true,"_links":{"self":[{"href":"https:\/\/www.andysowards.com\/blog\/wp-json\/wp\/v2\/posts\/34093"}],"collection":[{"href":"https:\/\/www.andysowards.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.andysowards.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.andysowards.com\/blog\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.andysowards.com\/blog\/wp-json\/wp\/v2\/comments?post=34093"}],"version-history":[{"count":1,"href":"https:\/\/www.andysowards.com\/blog\/wp-json\/wp\/v2\/posts\/34093\/revisions"}],"predecessor-version":[{"id":34097,"href":"https:\/\/www.andysowards.com\/blog\/wp-json\/wp\/v2\/posts\/34093\/revisions\/34097"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.andysowards.com\/blog\/wp-json\/wp\/v2\/media\/34096"}],"wp:attachment":[{"href":"https:\/\/www.andysowards.com\/blog\/wp-json\/wp\/v2\/media?parent=34093"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.andysowards.com\/blog\/wp-json\/wp\/v2\/categories?post=34093"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.andysowards.com\/blog\/wp-json\/wp\/v2\/tags?post=34093"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}