Five BYOD best practices

A number of CIOs are eager to allow staff to bring their own devices to work, with the enterprise either completely or partly paying for connectivity. But Dell Inc. notes that while BYOD initiatives can be great for employees, they often pose a potential nightmare for the organization if regulations aren’t complied with. Here are five best practices it recommends. All images from


Confirm and protect regulated data
Start by identifying all regulated data, then determine which data will be generated on, accessed from, stored on, or transmitted by BYOD devices. Then decide on the best strategies for protecting data it and ensuring compliance. You may need a combination of encryption, secure mobile workspaces and data leakage protection.

Tip 4 - 6 Tips to Improve Data Breach Response


Control access to data and networks
Deploy solutions for monitoring, tracking and controlling access rights according to a user’s identity, device type, location, time of access and resources accessed. In addition, prevent employees from accessing data on unsecured (or jailbroken) devices or transmitting unsecured data using their own device.



Secure devices
Craft extra security for employee-owned devices. As a first step, require a password to access devices or the secure workspaces on them. In addition, a smart card reader or fingerprint reader can prevent unauthorized access to tablets and laptops if they are lost, stolen or inadvertently used by family or friends.


Develop compliant apps
A secure device isn’t much help if the apps aren’t complaint. To assess application compliance, ask the following questions: Can the multifactor authentication required for enterprise applications be employed on smartphones? Are the mobile devices storing sensitive information? Does a secure Web session expire in the same amount of time on a tablet as it would on a corporate desktop? To show proof of compliance, be sure the solution supports appropriate reports and audit trails.


Train staff on the importance of  maintaining compliance

Employees have to understand the critical importance of adhering to regulations and potential consequences of compliance failures. Mobile employees must be especially sensitive to potential breaches while outside corporate walls. A signature on a document promising adherence to rules is not enough. Ongoing education is essential.



Would you recommend this article?


Thanks for taking the time to let us know what you think of this article!
We'd love to hear your opinion about this or any other story you read in our publication.

Jim Love, Chief Content Officer, IT World Canada
Howard Solomon
Howard Solomon
Currently a freelance writer, I'm the former editor of and Computing Canada. An IT journalist since 1997, I've written for several of ITWC's sister publications including and Computer Dealer News. Before that I was a staff reporter at the Calgary Herald and the Brampton (Ont.) Daily Times. I can be reached at hsolomon [@]

Featured Download

ITW in your inbox

Our experienced team of journalists and bloggers bring you engaging in-depth interviews, videos and content targeted to IT professionals and line-of-business executives.

More Slideshows

Top Tech News