BlogTips for BYOD Computer Network Security


recent CDW poll confirmed what many of us likely already know; tablet usage is increasing. In fact, the poll showed that roughly 33 percent of US adults own a tablet today compared with just 18 percent a year ago, and 56 percent of the poll respondents said that they use a tablet at work. Already, BYOD is firmly taking root in organizations of all size.

The good news according to CDW:

CDW found that tablet users spend about two hours daily on their tablet for work purposes, gaining just over one hour in daily productivity thanks to tablet use. Employees are spending about a quarter of their total computing time on their tablets, and especially like the ability to manage email and calendars and to take notes. A whopping 84% of respondents confirmed that tablets do make them better multi-taskers while at work.

So with employee productivity increasing with BYOD adoption, data security is becoming a concern – and one that could reverse employee productivity in a big way. Avnet CIO, Steve Phillips, shared a video recently that highlighted five tips for a more secure mobile workforce.  Here they are:

1. Password usage. While Steve encourages the use of passwords, it’s even more important to emphasize the use of strong passwords, and multiple passwords. Don’t use the same password for every logon as you’ll widen the exposure of any single data breach. Don’t use personal identifiers, such as your dog’s name or birthday, since social media channels like Facebook make it easy for hackers to find this information. Be sure to use letters, numbers and other keyword symbols. 

2. Keep other account passwords off mobile devices. This one is simple and important… don’t use the ‘remember me’ features common on computing devices today, and be sure to log off before exiting the program or application.

3. Keep critical data off of the device. Don’t download the data to the device. Instead, use it in the application and close that application when finished.

4. Be cognizant of malware on the mobile device. People are fairly cautious when using their computers or laptops, but tend to be less so with tablets and smartphones. Hackers are getting savvier with mobile malware, so we need to as well.

5. Be cautious of the cloud. The cloud has opened a world of opportunities for companies, employees…and hackers.

By embracing BYOD, you can realize some of the employee productivity gains that other companies are already experiencing. Not embracing BYOD – especially in light of the growing usage – could actually result in a decline in employee productivity, which can happen when you have unhappy employees.

About the Author

Dustin Smith

Dustin Smith, Chief Technologist

Throughout his twenty-five year career, Dustin Smith has specialized in designing enterprise architectural solutions. As the Chief Technologist at ASG, Dustin uses his advanced understanding of cloud compute models to help customers develop and align their cloud strategies with their business objectives. His master-level engineering knowledge spans storage, systems, and networking.