Personal information on company and personal devices often results in major security breaches. The reasons are simple – a fusion of personal and business affairs.

That’s why companies are developing BYOD (Bring Your Own Device) policies. Do you have one at your company? Most do not. According to a survey by Ipsos Mori (click here to read it):

  • 73 percent of respondents admitted downloading personal apps to corporate tablets.
  • 62 percent did the same on the corporate smartphones.
  • Over 50 percent used personal devices to conduct company business.

Here are 4 tips to minimize BYOD risks:

1. Educate Your Employees About Phishing Scams
Educating your employees is the first step towards maintaining a healthy data security culture. Phishing scams are among the most common cyber crime techniques people usually fall for, especially the so-called “urgency emails” e.g. “Get back to me ASAP with a link to fake website luring to reveal sensitive data. Another example from my friend’s company – a message from “Facebook” urging them to click the link and login to their Fan Page or it would be banned within the next 24 hours.

2. Enable “Wipe” Function on Corporate Devices
The worst security hazard is when a device is stolen or lost. In that case, the actionable protection is to set up the “wipe” function, which could immediately eradicate all the data from the device remotely.

3. Make Sure the Devices Are Updated Regularly
Make it clear those updates patch up security holes, thus giving less chances for cyber criminals to gain insider access. System update requests should be performed immediately and not tapped as “Remind me later”. Same goes for Anti-virus software updates, especially for Android devices, which are more prone to malware that comes with app downloads. Both Norton and Kaspersky offer comprehensive protection plans.

4. Educate About Public Wi-Fi Hazards
Public Wi-Fi is not secure and even when the alert pops up – a lot of users simply ignore it. You can’t forbid your employees to browse the web during lunch. But you can protect their user-experience.