Generation Y Poses Mobile Security Threat to BYOD Policies

Generation Y is bringing mobile security threats with them as they enter the workforce. According to a recent Fortinet survey, this tech-savvy generation is more willing to break the rules and put your corporate data at risk.

Fortinet surveyed 3,200 college graduates with full-time jobs between the ages of 21 and 32 in 20 countries. The respondents all owned a smartphone, tablet and/or laptop.

The research found that 51 percent of those surveyed would bypass company policies that restrict the use of personal devices, cloud storage or emerging wearable technology for work. It also showed a 42 percent increase in the willingness to break usage rules compared to a similar survey conducted last year.

Of the 89 percent of respondents that stated they had a personal cloud storage account, 70 percent admitted to using their account for work-related items such as passwords, financial information, confidential business documents and customer data:

  • 12 percent – work passwords
  • 16 percent – financial information
  • 22 percent – confidential business documents (contracts and plans)
  • 33 percent – customer data

Thirty six percent of respondents using their personal cloud for work purposes said they would break any rules enacted to stop them.

While the study’s results make the future of mobile management appear dismal, there is a silver lining. The vast majority – 88 percent – of the respondents accept that they have an obligation to understand the security risks posed by using their own devices. Education and advancements in technology services could be the solution to the BYOD security threat Fortinet has brought to the forefront.

IT administrators must proactively educate employees, particularly Gen Y, about mobile security threats and the risks associated with their actions. Also, consider distributing basic security best practices such as only using a secure Wi-Fi connection or keeping software up-to-date to protect their devices and the company’s data.

In addition, new tools and services cannot simply be ignored or banned. If employees are embracing unsanctioned technologies, it’s generally to fill a void that existing devices and services aren’t addressing. Listen to users to better understand the business value of these tools. Then find a solution that fills the employee’s need, while keeping sensitive corporate data protected.

————————————————————————————————

e-Cycle is the trusted wireless partner for many of the largest organizations in the world. As the first mobile recycling company to achieve e-Stewards certification, we adhere to the highest standards for environmental responsibility and worker health and safety. e-Cycle offers a simple, secure, environmentally responsible and profitable way for businesses to sell and recycle used mobile phones and tablets. Learn more at www.e-Cycle.com.

Businesses Request a Quote Button

e-Cycle: Five Common Mistakes to Avoid when Creating a BYOD Policy

With bring your own device (BYOD) programs exploding worldwide, enterprises are searching for the perfect solution for managing and securing employee-liable devices. Implementing a BYOD policy is tricky because each program must be customized to meet the specific needs for each company and there is no catch-all solution. As a global leader in the mobile buyback and recycling industry, e-Cycle shares five common BYOD mistakes that can lead to disgruntled workers, lower productivity as well as higher costs and mobile security headaches.

1. No Policy or Monitoring
BYOD’s major strength is the flexibility it lends to employees; however, businesses must be prepared for the liability that accompanies it. Creating a BYOD policy with specific guidelines for who owns the data, device and software, how the expenses are distributed and what happens to the device when it is lost or stolen will help to avoid legal matters and protect your company.

2. Excessive Mobile Security
Multiple passwords, remote device wipes and location trackers are important features to protect mobile data, but requiring over-the-top security features will leave employees soured on BYOD. Instead, search for solutions that enhance productivity and increase employee satisfaction, while still protecting sensitive mobile data. But be careful, restoring factory settings and remote wiping is not a guarantee of data removal. Often times sensitive information still remains on wireless devices including names, contact information, pin numbers, emails and even photos. A shocking study revealed confidential information was found on devices purchased on eBay.

3. Too Few Options
BYOD was intended to empower employees with the ability to choose the devices and apps they want. A program that is too limited may lower company morale and cause employees to develop their own workarounds to utilize the apps they prefer, which increases the likelihood of a breach. Give your employees enough options to boost productivity and create a positive output for the company.

4. Too Many Options
Managing mobile business data through numerous devices and carriers can quickly become a nightmare for an enterprise’s IT or mobility department. BYOD is meant to be beneficial to both the business and the employee. Offering three to four mainstream devices will please employees and allow the IT/mobility department to effectively manage mobile security, creating applications and troubleshooting. Be wary of devices and applications that are known to be traps for malware.

5. Not Thinking it Through
As the newest mobile trend, many companies are diving head first into BYOD without thinking the process through. Enterprises need to ensure that BYOD makes sense for the needs of the company and employees. BYOD can save businesses money; however, there are often hidden expenses that accompany this new trend like software licensing, mobile security, device management and regulatory compliance. These are all expenses that need to be considered when deciding to make the switch to BYOD.

6. Partner with a Trusted Mobile Buyback and Recycling Company
Encourage or mandate that your employees discard their used personally-owned devices securely and responsibly by utilizing a trusted wireless buyback and recycling company that has proven processes for data deletion. There are numerous consumer buyback companies that claim data protection, however, provide poor data security processes and unsecure facilities. Discourage employees from selling their used mobile devices on eBay and Craigslist.

Vetting and recommending a secure and proven mobile buyback and recycling partner to compensate your employees while protecting their sensitive data and the environment is critical to help negate data breaches and to protect your corporate reputation. Additionally, utilize e-Stewards® certified electronics recyclers who are rigorously audited each year to ensure they uphold globally-recognized standards for data security, environmental protection and worker safety.

—————————————————————————————————

e-Cycle is the trusted wireless mobile buyback and recycling partner for many of the largest organizations in the world. As the first mobile recycling company to achieve e-Stewards certification, we adhere to the highest standards for environmental responsibility and worker health and safety. e-Cycle offers a simple, secure, environmentally responsible and profitable way for businesses to sell and recycle used mobile phones and tablets. Learn more at www.e-Cycle.com.

Businesses Request a Quote Button

e-Cycle BYOD Mobile Data Security Tips #4 – Keep Mobile Device Software Up-to-Date

As a global leader in the mobile buyback and recycling industry, e-Cycle is pleased to share the fourth video in our series of BYOD mobile data security risks and recommendations for organizations thinking of implementing a Bring Your Own Device (BYOD) program. These tips will help to secure your sensitive mobile data on individually-owned wireless devices.

e-Cycle BYOD Mobile Data Security Tips – #4 Keep Mobile Device Software Up to Date from e-Cycle LLC. on Vimeo.

—————————————————————————————————

e-Cycle is the trusted wireless mobile buyback and recycling partner for many of the largest organizations in the world. As the first mobile recycling company to achieve e-Stewards certification, we adhere to the highest standards for environmental responsibility and worker health and safety. e-Cycle offers a simple, secure, environmentally responsible and profitable way for businesses to sell and recycle used mobile phones and tablets. Learn more at www.e-Cycle.com.

Businesses Request a Quote Button