Categories
Backup and Storage

Security measures ‘have to be in place’ with BYOD

Threat of internal theft has to be considered when letting employees use their own devices

While the bring your own device (BYOD) trend appears to be growing in popularity, there are still many concerns regarding its implications for data security and the safety of company information.

With workers accessing their employer’s servers and networks on their personal gadgets such as tablets and smartphones, the danger lies in the potential for the business’s records to be exposed – especially given the risk of internal theft.

"On the face of it, allowing employees to use their own devices in the business can seem attractive and potentially cost-saving," said Alex Rabbetts, managing director of Migration Solutions. 

"However, since one out of three cases of data theft are internal, the business is taking a huge risk if it isn’t thought through properly."

Given the threat that disgruntled or departing employees can pose when in possession of sensitive information, it appears extensive data protection methods will be needed to prevent potentially harmful leaks from occurring.

"Before allowing any employee to use their own device in any business, think very carefully," Mr Rabbetts added.

If companies are going to allow their staff to use their own devices in the workplace due to the trend’s benefits as a cost cutting measure, secure online document storage may prove vital in avoiding data being exposed.

Furthermore, with the Information Commissioner’s Office (ICO) reporting that one in ten people who sell their used hard drives leave residual personal information intact, this could also pose a problem for businesses if the device was used in the workplace.

According to the figures released by the ICO, 65 per cent of British adults now hand on their old phones, computers and laptops – either by selling them on or simply giving them away.

Considering the harm that can be done when a business has its data breached, many may look to implement effective strategies to stop employees that are using their own devices compromising sensitive information.