One Article Review

Accueil - L'article:
Source AlienVault.webp AlienVault Lab Blog
Identifiant 8487608
Date de publication 2024-04-22 10:00:00 (vue: 2024-04-23 21:07:04)
Titre Apportez votre propre appareil: comment éduquer vos employés sur les meilleures pratiques de cybersécurité
Bring Your Own Device: How to Educate Your Employees On Cybersecurity Best Practices
Texte The content of this post is solely the responsibility of the author.  AT&T does not adopt or endorse any of the views, positions, or information provided by the author in this article.  byod With the rise of remote and flexible work arrangements, Bring Your Own Device (BYOD) programs that allow employees to use their personal devices for work are becoming increasingly mainstream. In addition to slashing hardware costs, BYOD improves employee satisfaction by 56% and productivity by 55%, a survey by Crowd Research Partners finds. Yet, cybersecurity remains a concern for businesses. 72% are worried about data leakage or loss, while 52% fear the potential for malware on personal devices. But by implementing a strong BYOD policy and educating your employees on cybersecurity best practices, you can reap the benefits of BYOD without putting your company assets and data at risk. Put a Formal BYOD Policy in Place Just as your business has acceptable use policies in place for corporate devices, similar policies for personal devices are just as important. Your company’s BYOD policy should provide your employees with clear rules and guidelines on how they can use their devices safely at work without compromising cybersecurity. This policy should cover: Devices, software, and operating systems that can be used to access digital business resources Devices, software, and operating systems that can’t be used to access digital business resources Policies that outline the acceptable use of personal devices for corporate activities Essential security measures employees must follow on personal devices (such as, complex passwords and regular security updates) Steps employees must follow if their device is stolen or lost (like immediately report it to their manager or IT department) A statement that your business will erase company-related data from lost or stolen devices remotely What happens if an employee violates your BYOD policy (are you going to revoke certain access privileges? If you give employees an allowance to cover BYOD costs, will you freeze the funds? Provide additional corrective training?). Don’t forget to also include a signature field the employee must sign in to indicate their agreement with your BYOD policies. The best time to introduce employees to the policy is during onboarding or, for existing employees, during the network registration process for the BYOD device. Setting expectations and educating your employees is essential to protect both company data and employee privacy. Basic Cybersecurity Training When putting together your BYOD employee training program, don’t make the mistake of thinking basic device security is too…basic. It’s not. Since personal devices are usually less secure than corporate devices, they’re generally at a greater risk of data breaches, viruses, and loss or theft. Comprehensive user education that includes the basics is therefore all the more important to mitigate these risks. So as a basic rule, your employees should know not to allow their devices to auto-connect to public networks. If, on rare occasions, employees really do need to access company data on an open network, they should use a virtual private network (VPN). VPNs encrypt data and hide we
Envoyé Oui
Condensat about acceptable access accessing activities activity addition additional adds adopt advantages agreement all allow allowance also although any apps are arrangements article assets at&t attack author authorized auto basic basics becoming benefits best both breaches bridge bring business businesses but byod can can’t carry central certain clear communicating company company’s complex comprehensive compromising concern connect connected content corporate corrective costs cover cover: crowd cyberattacks cybercriminals cybersecurity data department device device: devices digital does don’t downloaded during educate educating education emphasize employee employees encrypt endorse erase essential existing expectations exploited expressly extra fear field finds fix flexible follow forget formal freeze from funds gaps generally give goes going greater guidelines happens hardware has have hide how immediately implementing important improves include includes increasingly indicate information installed introduce it’s just know layer leakage less let like loss lost mainstream make malicious malware manager manufacturer measures mistake mitigate months more most must nature need network networks not occasions often onboarding only open operating order outline own partners passwords past personal place policies policy positions post potential practices privacy private privileges process productivity program programs protect provide provided public put putting rare really reap registration regular regularly related released remains remote remotely report research resources responsibility revoke rise risk risks rule rules safely same satisfaction say second secure security setting shockingly should sign signature similar since slashing software solely soon statement steps stolen strong successful such survey system systems target tasks than theft them therefore these they’re thinking time together too…basic training unauthorized understand unpatched unsecured update updated updates use used user usually views violates violations virtual viruses vpn vpns vulnerabilities vulnerable weaknesses web what when which whopping wifi will without work worried yet your
Tags Malware Vulnerability
Stories
Notes ★★★
Move


L'article ne semble pas avoir été repris aprés sa publication.


L'article ne semble pas avoir été repris sur un précédent.
My email: