<img src="https://ws.zoominfo.com/pixel/6169bf9791429100154fc0a2" width="1" height="1" style="display: none;">

Curious about how StrongDM works? 🤔 Learn more here!

Search
Close icon
Search bar icon

BYOD Policy | Best Practices to Help Keep Your Network Secure

Removable media, cloud storage, and bring your own devices (BYOD) can be a quick and convenient way for employees to handle data.  But with this convenience comes some serious security concerns.

Unprotected removable storage is an easy entry point for end users to inadvertently bring in viruses and malware into your company network, thus increasing the risk of business data exposure, hardware failures and data breaches. While it may be easier to prohibit employees from using removable media and declare it a punishable offense, that approach is impractical and unrealistic.

If you do decide to allow removable media, cloud storage, and BYOD, here are five things to include in your policy:

What should a BYOD Policy include?

For removable media and bring your own devices:

  • Define that confidential data can never be stored on the device
  • Create a procedure to report a lost/stolen device immediately
  • Require data stored on removable media to be encrypted to prevent against data loss if the device is lost/stolen (refer to our post on writing an Encryption Policy)
  • Wipe company data from device as part of the offboarding process
  • Note: You may be liable if you wipe personal information while removing company data
  • Complement all administrative, physical and technical BYOD controls with an acceptable use policy

Removable media

Removable media is any type of storage device that can be removed from a computer without powering off the system, such as USB drives, external hard drives, and memory cards. Many companies are opting to only allow removable media that is approved and/or controlled by IT before use.  For example, your IT team may choose to scan USB drives for viruses before allowing them to be connected to any corporate system. Or, IT may block all USB drive usage except from specific hardware they control. In some extremely security conscious cases, companies block removable media altogether.

Cloud storage

Cloud storage is a quick and convenient way to give employees access to internal documents. However, security controls for cloud storage are dependent on the provider. As discussed in the IT Vendor Management post, it is on you to ensure the cloud storage provider meets your security requirements. You can’t just assume they will be responsible.

It’s a good idea to have some discussion and planning around cloud storage before just leaving it wide open for people to use.  For example, you may want to declare that staff are required to use only the company provided/approved cloud services, and that employees cannot create accounts without formal organizational approval. You can leverage additional technical controls, such as Web site and application blocking on your firewall, to help enforce the policy.

Bring your own device (BYOD)

Bring your own device, also known as BYOD, can be tricky to regulate.  On one hand, these devices belong to employees, so you are limited in the amount of technical controls you can enforce.  On the other hand, these devices will regularly be connecting to your VPN and wi-fi networks, as well as your file and mail servers.  At a minimum, your policy should define certain requirements, such as those outlined in item #1 above. Additionally, you should restrict which applications on the device can interact with company data, and define strong passwords and PIN requirements.

For additional control, there are technical tools available to help you manage BYOD more granularly.  A mobile device management (MDM) solution, for example, can help you strike the right balance between keeping your corporate data safe while still giving employees freedom to do their jobs.  MDMs can help you define which applications on a user’s device can interact with corporate data, as well as the minimum level of operating system a device needs to have.  

MDMs can also “containerize” corporate data on personal devices and protect it with controls you define - such as a PIN/password or thumbprint.  That way, if a user’s device gets lost or stolen, you have an extra layer of protection surrounding the corporate data. You also then have the power to wipe just the corporate data off the device while still leaving the user’s pictures, videos, contacts, etc. in tact.  Make sure you understand an MDM policy and do a careful analysis of MDM offerings before selecting one - some vendors have better controls for iOS devices (iPods, iPads, iPhones) than they do for Android phones and tablets.  

Communicate clear expectations

Because the lines of employee privacy can get blurry when enforcing controls and expectations on personal devices, good communication is key.  Clearly articulate and document your expectations to employees, such as:

  • Minimum PIN/password requirements - it used to be that a 4-digit PIN was accepted, but today a 6-digit PIN is standard.
  • What kind of information cannot be sent/accessed through personal devices?
    Will you allow personal devices to connect to your VPN?  Can users access corporate email? Will they be able to copy and paste company information into their personal applications?  
  • Define when and why the company will wipe an employee’s phone
    This is a big one.  You need to make these conditions very clear to employees - both during on-boarding and when their devices first connect to the wi-fi network.  Otherwise, if an employee leaves the company and you wipe the phone on the way out the door, the situation could raise legal issues for your company.  Therefore it’s a good idea to have employees sign a BYOD agreement - and pair it with an acceptable use policy - before ever allowing personal devices to touch your corporate network or data. You can also look into contact centers.
  • What happens to personal devices during off-boarding procedures?
    Whatever BYOD decisions you make in policies and enforce with technical controls, make sure they are clearly explained to users during off-boarding.  This is another reason that creating a BYOD agreement for users to sign on day one is a good idea.
  • What qualifies as an incident and what steps will be taken as a result?
    Define incidents in as much detail as you can, and also spell them out clearly in policy.  That way, users will understand what they might otherwise view as extreme reactions. For example, if your MDM solution reports that a personal device has a virus, and your policy states that any devices with known infections will be wiped immediately, you have proper justification to wipe the device.  Otherwise, incidents that arise on personal devices might get into a gray area and cause conflicts between the IT department and other teams.

Portable hard drives, cloud storage, and personal devices provide easy ways to shuttle files between machines and over the Internet.  Unfortunately, policing them from a corporate standpoint is anything but easy. It’s important to train users on how to use these tools properly in a work environment, as well as how and where they can store or transmit sensitive information.  Finally, and perhaps most importantly, make sure users are crystal clear on the actions you will take on their devices and storage mediums when an incident happens.

StrongDM can help drastically speed up and improve security while onboarding and offboarding employees, even when they use their own devices. Try StrongDM with a free, 14-day trial.

 

About the Author

, Chairman of the Board, began working with startups as one of the first employees at Cross Commerce Media. Since then, he has worked at the venture capital firms DFJ Gotham and High Peaks Venture Partners. He is also the host of Founders@Fail and author of Inc.com's "Failing Forward" column, where he interviews veteran entrepreneurs about the bumps, bruises, and reality of life in the startup trenches. His leadership philosophy: be humble enough to realize you don’t know everything and curious enough to want to learn more. He holds a B.A. and M.B.A. from Columbia University. To contact Schuyler, visit him on LinkedIn.

StrongDM logo
💙 this post?
Then get all that StrongDM goodness, right in your inbox.

You May Also Like

Automating access to cloud environments
Managing Access to Ephemeral Infrastructure At Scale
Managing a static fleet of strongDM servers is dead simple. You create the server in the strongDM console, place the public key file on the box, and it’s done! This scales really well for small deployments, but as your fleet grows, the burden of manual tasks grows with it.
Illustration of an technical employee who is offboarding from their employer.
All Offboard! The 2024 Tech Staff Offboarding Checklist
Offboarding technical employees can be a complex and arduous process with a lot of moving parts. The key to successful offboarding is to have a clear understanding of what needs to be done, who does it, and how to monitor for any shenanigans from former employees.
User Provisioning: How To Automate & Manage Credentials
How We Automate User Provisioning & Keep Track of Credentials
There are a number of ways to automate user provisioning but the real challenge lies in keeping track of those credentials.
SOC 2 dashboard
What Would My SOC 2 Dashboard Look Like?
As your organization pursues your SOC 2 certification, organization is critical. ‍You will be busy actively managing dozens of ongoing daily tasks, which can bury you in minutiae. But at the same time, you need to keep your high-level compliance goals in focus in order to successfully move your certification over the finish line.
SOC 2 Policies Guide
A Definitive Guide to SOC 2 Policies
In this post, we will help you get started with a hierarchy to follow, as well as a summary of each individual SOC 2 policy.