With “bring your own device—or BYOD—policies becoming increasingly popular, employers must train their workers to mitigate risk. However, there is a tight rope to walk when it comes to implementing a BYOD policy. IT and HR should not be so protective that a new policy hinders employee’s abilities to work on their own devices, preventing such a program from ever gaining traction. However, managers developing a BYOD policy should also be careful not to be too lax, paving the way for sensitive data breaches. Three strategies can help. First, maintain transparency. Being open with employees about privacy rights and enterprise mobility management components can help build a sense of trust where employees and managers alike will use mobile devices responsibly. Second, maximize the protection of employee devices. IT professionals must maintain control over the sensitive data stored on an employee’s device. This means cultivating the ability to monitor sensitive information consistently. Some companies will set up automated alerts to notify them if a device has been jailbroken, modified to remove the controls of the original manufacturer, or is outside its predetermined geographic parameters. Finally, incorporating holistic device management programs can help ensure data breaches do not occur.
View Source: Information Week