<p>Endpoint usage policies must evolve as user behavior, device ownership models and regulatory expectations continue to shift. BYOD endpoints present especially complicated challenges for organizations, which have to ensure all endpoints meet data privacy and security regulations, despite not owning the devices.</p>
<p>From a compliance perspective, <a href=”https://www.techtarget.com/whatis/definition/BYOD-bring-your-own-device”>BYOD</a> complicates an organization’s ability to demonstrate consistent access control, policy enforcement and audit readiness across enterprise data. Therefore, it’s necessary to build a BYOD policy foundation that incorporates feedback from users in different business units.</p>
<section class=”section main-article-chapter” data-menu-title=”Develop a BYOD policy and communicate it to users”>
<h2 class=”section-title”><i class=”icon” data-icon=”1″></i>Develop a BYOD policy and communicate it to users</h2>
<p>As with any security initiative, building a BYOD policy foundation will have the greatest likelihood of success. Take the time to clearly articulate the boundaries of personal device use within an enterprise. <a href=”https://www.techtarget.com/searchmobilecomputing/tip/3-BYOD-security-risks-and-how-to-prevent-them”>Enterprise BYOD security policies</a> should answer many common questions about personal device use for both end users and IT professionals. Here are some questions to consider:</p>
<ul class=”default-list”>
<li>Who’s authorized to access enterprise data from personal devices?</li>
<li>Under what conditions may personal devices connect to enterprise networks?</li>
<li>Does the organization require explicit approval for each BYOD instance?</li>
<li>What security controls must exist on BYOD endpoints?</li>
</ul>
</section>
<section class=”section main-article-chapter” data-menu-title=”Build BYOD policies around user needs, if possible”>
<h2 class=”section-title”><i class=”icon” data-icon=”1″></i>Build BYOD policies around user needs, if possible</h2>
<p>Setting BYOD policies in an IT silo tends to be counterproductive in the end, especially as more workers are outside the traditional network of endpoints. Work to build alliances and partnerships with workers in business units to set a positive found
[…]
Content was cut in order to protect the source.Please visit the source for the rest of the article.
Read the original article: