How to overcome 3 common BYOD security threats with Microsoft Intune

Posted by piksel on Jun 28, 2019 11:43:00 AM

BYOD is fast becoming the new normal in business. In fact, estimates suggest that the market will reach £292.97 billion by 2022.

By implementing a BYOD policy in your retail business, not only can you save up to £274 per year, per employee, you’ll also increase sales, with portable devices saving employees 58 minutes per day and increasing productivity by 34 percent.

However, despite the advantages of BYOD, there are new security threats you’ll need to consider. After all, your employees will treat their own devices differently to the ones supplied by your company. For example, they might not think to install adequate anti-virus software or encrypt sensitive files.

To protect your business from these BYOD security threats, you need a mobile device management tool that minimises the amount of time your IT team spends provisioning, securing, and patching employee devices.

In this blog post, we’ll look at three of the most common BYOD security threats and show you how Microsoft Intune can help you overcome them.

New call-to-action

1. Lost or stolen devices

The ability to work from anywhere is both a blessing and a curse. While, on the one hand, it makes your team more productive, on the other it increases the chance of loss or theft.

In the wrong hands, an unsecured device can spell disaster for your business. For example, if sensitive customer information such as customer credit card details were leaked, not only would you lose revenue, your reputation would suffer too. Thankfully, with Intune you can remove company data on all apps and devices.

2. Insufficient access management

Passwords aren’t the insurance policy they once were. In fact, hackers can now guess and compromise most passwords through a combination of different techniques:

  • Brute force: entering as may combinations of letters, numbers and symbols as possible.
  • Dictionary attacks: entering every word in the dictionary as a password.
  • Shoulder-surfing: discovering your password through direct observation. For example, watching you type into your laptop in a café.
  • Social engineering. Hackers trick victims into giving up sensitive information through presenting themselves as a trusted individual or information source.

To combat this threat, Intune helps employees boost their device security through identity and access management tools. This allows you to choose which devices and users can access certain company data.

Combining this approach with multi-factor authentication, like facial or fingerprint recognition, enables you to better protect your corporate data, no matter which device it’s accessed on.

3. Shadow IT and unauthorised applications

When you allow employees to use personal devices for their work, you increase the risk of shadow IT. This is when employees download unauthorised applications and software that are potential risks to your business.

With Intune, this is no longer an issue. Employees can use the apps they want while protecting your company data. In-built mobile application protection polices allow you to prevent data loss without managing the user’s actual device. In effect, you don’t have to ask your employees to give up their personal data or restrict the apps they’re using on their device.

Intune managed apps allow you to:

  • Restrict copy-and-paste and save-as functions so employees can’t transfer business information to an outside network.
  • Configure web links to open inside the Intune Managed Browser app, allowing for a secure browsing experience.
  • Enable multi-identity use and app-level conditional access, meaning you can separate business and personal data on a single application (for example Outlook).

All of this helps keep your business information separate from employee personal data, even on their own device. So, no matter what your employee does in their own time, your business is safe.

Implement BYOD effectively with Microsoft Intune

Last year, in a survey of 500 small businesses, 61 percent said they suffered a cybersecurity incident after creating a BYOD policy.

This didn’t need to happen. With the right tools, they could have avoided such a fate.

Implemented correctly, BYOD is a very effective tool to boost your productivity and sales. And with Microsoft Intune, you don’t need to worry about manually securing your apps and data.

Want to find out more about implementing the perfect BYOD strategy? Check out our five-step guide and ensure you don’t fall victim to any of threats we’ve listed above.

New call-to-action

 

Topics: BYOD, Microsoft Intune

Related posts

Building a BYOD policy: 3 questions every retailer needs to ask

Bring-your-own-device (BYOD) policies are a cost-effective way to drive business growth. In fact, on average, these policies save individual...

Read more

The latest tweets