Bring your own device (BYOD) to work is becoming increasingly popular among businesses. So, what are the risks? Are the benefits worth making your network vulnerable? That’s what we’re going to dig into with this short blog series. This is the first of four articles on BYOD.
Adjusting for the security risk
Throughout this series, we’ve discussed the risks that BYOD presents in the work environment. In everything, there is risk. If the benefits outweigh the potential consequences, then it’s worth it to proceed because there are often higher rewards.
You have to decide if BYOD is right for your business. If you decide it is, here’s how you might consider adjusting for the risks that are associated with it.
By using a SonicWALL Firewall, you have the option of creating a secure wireless zone which is separate from the local network. This would minimize risk of contamination to the critical files on your network should a virus or other form of malware gain access through a BYOD device. With SonicWALL Firewalls, you can specify what those devices have access to; chose whether to enable or disable total access to the network. If you decide that it’s simply too high of a risk to expose your network to BYOD devices, you can choose to restrict access to only email. SonicWALL’s product line offers a variety of options to adjust for the risk that BYOD devices pose.
The best way to adjust for the security risk is to create a virtual desktop environment that your employees have access to and can connect to through an SSL-VPN connection. By having a virtual desktop environment, you reduce the probability of viruses or cross-contamination while improving the access to shared resources such as expensive software packages. Check out this video by our CIO, Kyle Diederich, on SonicWALL’s Mobile Connect app for iOS and Android platforms. Mobile Connect creates and SSL-VPN connection from your device to the network allowing you to connect securely.
Another option is to create an entirely separate network for BYOD devices. Although this minimizes risk of contaminating critical files on your network, it poses some inconveniences. If the employee needs to retrieve a file from the network, they would not have access to that on the BYOD network.
BYOD poses a number of risks for your network and the “right” way of adjusting for the security risk is different for each company. Evaluate with your network administrator what will work for you and your business.
Miss the other articles in the series? Read them now:
BYOD (Bring Your Own Device): 1 of 4
Pros and Cons of BYOD: 2 of 4
BYOD Policy: 3 of 4
Have questions? Comment below.