
{"id":2783,"date":"2014-02-07T00:00:00","date_gmt":"2014-02-07T00:00:00","guid":{"rendered":"http:\/\/otava.test\/top-10-tips-for-securely-managing-byod-in-the-workplace\/"},"modified":"2014-02-07T00:00:00","modified_gmt":"2014-02-07T00:00:00","slug":"top-10-tips-for-securely-managing-byod-in-the-workplace","status":"publish","type":"post","link":"https:\/\/www.otava.com\/blog\/top-10-tips-for-securely-managing-byod-in-the-workplace\/","title":{"rendered":"Top 10 tips for securely managing BYOD in the workplace"},"content":{"rendered":"<p><em>Note: The following article is part of a shared content agreement between Online Tech and <a href=\"https:\/\/resources.infosecinstitute.com\/\" target=\"_blank\" rel=\"noopener noreferrer\">InfoSec Institute<\/a>. (View <a href=\"https:\/\/resources.infosecinstitute.com\/tips-managing-byod-security\/\" target=\"_blank\" rel=\"noopener noreferrer\">original post<\/a>.) <\/em><\/p>\n<p><em>For more <a href=\"https:\/\/otavawebsite.wpengine.com\/blog\/tag\/byod\/\">BYOD <\/a>information, check out a <a href=\"https:\/\/otavawebsite.wpengine.com\/blog\/to-be-byod-or-not-to-be-byod-is-a-bring-your-own-device-policy-right-for-your-organization\/\" target=\"_blank\" rel=\"noopener noreferrer\">replay of a past Online Tech webinar<\/a> co-hosted by Tatiana Melnik, an attorney concentrating her practice on IT, data privacy and security, and regulatory compliance, &#8220;To be BYOD or not to be BYOD: Is a Bring Your Own Device Policy Right for Your Organization?&#8221; We&#8217;ve also previously <a href=\"https:\/\/otavawebsite.wpengine.com\/blog\/2013-mobile-security-byod-resource-roundup\/\" target=\"_blank\" rel=\"noopener noreferrer\">compiled some of the best <\/a>articles, white papers, webinars and other media that explains mobile data security and how to prevent compromised data in your organization.<br \/>\n<\/em><\/p>\n<p>The BYOD (Bring Your Own Device) phenomenon is expanding at an incredible rate. It is something that affects every business, from the smallest to the largest. How each business is dealing with BYOD ranges from complete apathy to a full embrace of it with sophisticated processes and controls in place to maximize employee productivity while minimizing risk to the business.<\/p>\n<p>The goal of this article is to give you the information you need to get control over how employees are using their own personal devices to access, store, and communicate business-owned information in the course of doing their jobs.<\/p>\n<p><!--more-->Even if you\u2019ve never heard the term BYOD before, you are almost certainly aware of it.<\/p>\n<p>Until a few years ago, the way most businesses gave their employees mobile access to corporate resources such as email was to issue them a device, with Blackberry devices being very popular because of their strong central management capabilities. The company would completely control the configuration, use, and security of the devices because the devices belonged to the company.<\/p>\n<p>Recently the mobile devices that are marketed to consumers, which individuals are buying for their own personal use, contain sophisticated capabilities to do email, access documents over a network, run web-based intranet apps, and beyond. Employees having already bought such a device for their own personal use would much prefer to use that device for their business dealings rather than carry a separate company-issued device.<\/p>\n<figure id=\"attachment_4525\" aria-describedby=\"caption-attachment-4525\" style=\"width: 254px\" class=\"wp-caption alignright\"><a href=\"https:\/\/otavawebsite.wpengine.com\/blog\/tactical-mobile-device-security-measures-to-meet-hipaa-compliance\/smartphones\/\" rel=\"attachment wp-att-4525\"><img loading=\"lazy\" decoding=\"async\" class=\"size-full wp-image-4525\" title=\"Smartphone Security\" src=\"https:\/\/www.otava.com\/wp-content\/uploads\/2019\/04\/Smartphones.jpg\" alt=\"Smartphone Security\" width=\"254\" height=\"400\" \/><\/a><figcaption id=\"caption-attachment-4525\" class=\"wp-caption-text\">Smartphone Security<\/figcaption><\/figure>\n<p>The reason that BYOD is something you need to be aware of and to deal with is that the pressure from employees to support it will only continue to grow. If your company were to completely suppress BYOD by allowing only company-issued and owned devices and completely banning the use of personal devices, you will eventually not be able to avoid the fallout of your employee\u2019s frustration. Most employees are dedicated to their employer\u2019s goals and have the best of intentions and want to get their jobs done in the most efficient way possible. If you take away a popular means for increasing their efficiency, they will eventually be more attracted to other companies that are not as restrictive.<\/p>\n<p>But embracing BYOD for the sake of your employee\u2019s productivity and good morale does not have to mean simply swinging the barn door wide open and letting it be a free-for-all. There are steps you can take to put processes in place, and tools to enforce elements of those processes, that will allow your employees to use their personal devices to be productive while minimizing the security risks to your company. For more information on enterprise security and the processes discussed in this article, check out our <a href=\"https:\/\/www.infosecinstitute.com\/courses\/cism_bootcamp_training.html\" target=\"_blank\" rel=\"noopener noreferrer\">Certified Information Security Manager (CISM) <\/a>certification program.<\/p>\n<p>Tips:<\/p>\n<p><strong>1. Know who is accessing your network and your data<\/strong><\/p>\n<p>This seems obvious but needs to be said. Regularly review what accounts are active for your email service, your VPN, intranet applications with their own user databases, etc. Are there any accounts active for anyone that shouldn\u2019t have access (former employees, contractors, etc.)? Are there any accounts with unusual activity such as a high number of unsuccessful logins? Do you have any open access to business data that does not require any authentication?<\/p>\n<p>This is not necessarily specific to mobile devices \u2013 you should already be aware of all the openings on your network. This includes anywhere that someone may obtain access to corporate data, and you should be monitoring the access made by any type of endpoint.<\/p>\n<p><strong>2. Know what data can be accessed remotely<\/strong><\/p>\n<p>Some information your company keeps that employees use for their job is not at risk of loss because it has no special value that would be compromised in the hands of outsiders. Other information is extremely valuable and must be guarded carefully.<\/p>\n<p>It is helpful to prioritize the relative risk of the data that can be accessed through each portal to the outside world. Obviously, you\u2019ll want to put more effort into controlling access to those places that have the most sensitive data and may want to put less effort, or even no effort, toward controlling access to places with low-risk data.<\/p>\n<p><strong>3. Know how employee devices are configured<\/strong><\/p>\n<p>Mobile devices are of particular concern when it comes to corporate data because of their high susceptibility to physical loss. Any data that the employee rightly needs access to in order to do their job is a liability if the device were to fall into someone else\u2019s hands. In addition to the risk of their form factor, there is additional risk of data loss through electronic means. Vulnerabilities exist in all of the popular mobile device platforms.<\/p>\n<p>The most immediate and effective line of defense is to minimally ensure that each device that is used to access your network is properly configured to reduce the risk of data loss from that device. The appendix suggests some specific settings that should be checked, and there are a number of other sources that give specifics on safe configuration. But the most important part is that you are using some method to ensure that employees have their devices securely configured. This brings us to the next tip:<\/p>\n<p><strong>4. Use a management and\/or audit tool<\/strong><\/p>\n<p>The most basic way to ensure that employees are safely configuring their devices would be to give them verbal or written instructions on how to do this and expect adherence to the policies. But there are potential problems with this approach:<\/p>\n<p>Employees, even the diligent ones, tend to forget about instructions \u2013 unless rigorous training is provided which makes the instructions become like second nature.<\/p>\n<p>They may follow the instructions after they are first communicated, but then forget about them over time and let their devices drift into more risky configurations.<\/p>\n<p>You\u2019ll have better piece of mind if you have a way of knowing for certain that your instructions are being followed, rather than simply trusting that they are.<\/p>\n<p>The best approach is to use a tool that can automatically report a device\u2019s configuration and help or force employees to keep them securely set. The best of these tools should give you good insight into how employee devices are configured and where they deviate from the policies you\u2019ve set for proper configuration. They should also aid in bringing employee devices in line with your desired configuration \u2013 either by guiding the employees to properly set their configuration, or by setting it for them.<\/p>\n<p>The tools most commonly recommended today are MDM (Mobile Device Management) tools. However, MDM tools are a somewhat heavyweight solution and might be more than what is needed for a lot of smaller organizations.<\/p>\n<p>There is an alternate approach that may be more suited to BYOD because it does not take control of the employee\u2019s device. This new class of tools provides Mobile Device Auditing, which reports on current device configurations, but does not take complete control of the device. These tools may be a more lightweight approach to getting a handle on BYOD devices and may be more popular with your employees.<\/p>\n<p><strong>5. Communicate clearly with your employees<\/strong><\/p>\n<p>It is important that employees using BYOD are told clearly what type of monitoring and\/or control of their devices is being employed. For example:<\/p>\n<ul>\n<li>What data is being monitored?<\/li>\n<li>What settings may be automatically modified?<\/li>\n<li>How will information about their devices be used by the company?<\/li>\n<li>What is the data retention period?<\/li>\n<li>Etc.<\/li>\n<\/ul>\n<p>If you are auditing or controlling employee devices in any way, you will likely need to have a written agreement that clearly spells out what information you are able to view or modify on their device.<\/p>\n<p>It is also important that employees are aware of what their responsibilities are. For example:<\/p>\n<ul>\n<li>Keeping the device\u2019s security configured<\/li>\n<li>Immediately reporting any suspicious activity<\/li>\n<li>Immediately reporting if the device is lost or a data breach is suspected<\/li>\n<li>Ensure that any agent used for company auditing is kept in working order<\/li>\n<li>Etc.<\/li>\n<\/ul>\n<p><strong>6. Be sure whatever tools you use do not compromise the privacy of the user\u2019s device<\/strong><\/p>\n<p>Remember that BYOD devices, even though they are used for accessing your business\u2019s data, still belong to the employee. It is important to strike a balance that meets the needs of both parties. You need a way of being reassured that the device is configured and used in a secure way that reduces the risk of loss of your company\u2019s information. They need to be able to use the device for their personal use in any way that doesn\u2019t directly compromise the security of business data.<\/p>\n<p>Employees will be much happier if they know that their employer does not have access to information and content that they don\u2019t have a valid need to access. This might include GPS locations, contents of personal communications i.e., text messages or email on a non-business account, etc.<\/p>\n<p>Note that most MDM systems will take control of the device. In order for them to know the current configuration state, they push changes to the device to set the configuration as dictated by the security policy. This may result in pushback from employees who are willing to let employers monitor the basic configuration settings but do not want modifications to be forced on their device. If you are at all concerned about this, look into using a Mobile Device Auditing tool rather than a traditional MDM system.<\/p>\n<p><strong>7. Have a plan for how to handle any data breach<\/strong><\/p>\n<p>The best approach to reducing the risk of data loss is to realize that you are looking to reduce risk, not eliminate it entirely. It would be cost prohibitive, not to mention impossible, to completely eliminate the risk of any data breach whatsoever. The tips above are structured around identifying where risk is the greatest and putting the most effort towards those areas with the most risk.<\/p>\n<p>Since your risk is reduced and not entirely eliminated, you do need to be prepared for what to do if there ever is a data breach. Think about who should be notified, what immediate configuration changes should be made to effected systems, what forensic activities you might be able to take, etc. Create a written plan so you can follow your plan effectively during what might be a stressful time.<\/p>\n<p>But the stress should not be too overwhelming, because by following the rest of these tips you\u2019ve reduced the risk of the most costly situations as much as possible.<\/p>\n<p><strong>8. Audit regularly<\/strong><\/p>\n<p>It is important that all of the actions outlined in the tips above be revisited regularly over time. Your IT systems are sure to change over time and it is important to keep your processes and tools up-to-date with the current state of your business information systems.<\/p>\n<p><strong>9. Plan for eventually having to prove compliance with your policies<\/strong><\/p>\n<p>You may already be doing this for your traditional server and desktop endpoints. You may be required to report to an outside authority on compliance with a regulation such as HIPAA, PCI, Sarbanes Oxley, etc. You may also need to report internally to your own company\u2019s auditors that want to ensure a certain level of diligence around IT security.<\/p>\n<p>This activity will inevitably extend to cover mobile devices the way it is currently used for traditional systems. It is only a matter of time before regulations are extended to insist on controls over access to your network from mobile devices. If you are already diligently following procedures such as the ones given in these tips, you will be well prepared for dealing with this eventuality.<\/p>\n<p><strong>10. Enjoy a happier workforce and greater piece of mind for your efforts<\/strong><\/p>\n<p>Putting in place the types of procedures mentioned here will require planning, effort, and resource expenditure. But take solace in knowing that it will all pay off. Your company\u2019s executives will be happy that you have systematically reduced the risk of damaging data loss, and your employees will be thrilled that you are working with them to be as productive as possible rather than having them feel that you are an impediment to their success.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Note: The following article is part of a shared content agreement between Online Tech and InfoSec Institute. (View original post.) For more BYOD information, check out a replay of a past Online Tech webinar co-hosted by Tatiana Melnik, an attorney concentrating her practice on IT, data privacy and security, and regulatory compliance, &#8220;To be BYOD or not to be BYOD: Is a Bring Your Own Device Policy Right for Your Organization?&#8221; We&#8217;ve also previously compiled some of the best articles, white papers, webinars and other media that explains mobile data security and how to prevent compromised data in your organization. The BYOD (Bring Your Own Device) phenomenon is expanding at an incredible rate. It is something that affects every business, from the smallest to the largest. How each business is dealing with BYOD ranges from complete apathy to a full embrace of it with sophisticated processes and controls in place to maximize employee productivity while minimizing risk to the business. The goal of this article is to give you the information you need to get control over how employees are using their own personal devices to access, store, and communicate business-owned information in the course of doing their jobs.<\/p>\n","protected":false},"author":3,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[59],"tags":[],"other_category":[],"class_list":["post-2783","post","type-post","status-publish","format-standard","hentry","category-information-technology-tips"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v27.2 (Yoast SEO v27.2) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>Top 10 tips for securely managing BYOD in the workplace | OTAVA<\/title>\n<meta name=\"description\" content=\"The reason that BYOD is something you need to be aware of and to deal with is that the pressure from employees to support it will only continue to grow.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.otava.com\/blog\/top-10-tips-for-securely-managing-byod-in-the-workplace\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Top 10 tips for securely managing BYOD in the workplace\" \/>\n<meta property=\"og:description\" content=\"The reason that BYOD is something you need to be aware of and to deal with is that the pressure from employees to support it will only continue to grow.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.otava.com\/blog\/top-10-tips-for-securely-managing-byod-in-the-workplace\/\" \/>\n<meta property=\"og:site_name\" content=\"OTAVA\" \/>\n<meta property=\"article:published_time\" content=\"2014-02-07T00:00:00+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.otava.com\/wp-content\/uploads\/2019\/04\/Smartphones.jpg\" \/>\n<meta name=\"author\" content=\"Irma Brillantes\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Irma Brillantes\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"11 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.otava.com\/blog\/top-10-tips-for-securely-managing-byod-in-the-workplace\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.otava.com\/blog\/top-10-tips-for-securely-managing-byod-in-the-workplace\/\"},\"author\":{\"name\":\"Irma Brillantes\",\"@id\":\"https:\/\/www.otava.com\/#\/schema\/person\/35774075f8f4fcdd4eae80cb72034263\"},\"headline\":\"Top 10 tips for securely managing BYOD in the workplace\",\"datePublished\":\"2014-02-07T00:00:00+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.otava.com\/blog\/top-10-tips-for-securely-managing-byod-in-the-workplace\/\"},\"wordCount\":2139,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\/\/www.otava.com\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.otava.com\/blog\/top-10-tips-for-securely-managing-byod-in-the-workplace\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.otava.com\/wp-content\/uploads\/2019\/04\/Smartphones.jpg\",\"articleSection\":[\"Information Technology Tips\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/www.otava.com\/blog\/top-10-tips-for-securely-managing-byod-in-the-workplace\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.otava.com\/blog\/top-10-tips-for-securely-managing-byod-in-the-workplace\/\",\"url\":\"https:\/\/www.otava.com\/blog\/top-10-tips-for-securely-managing-byod-in-the-workplace\/\",\"name\":\"Top 10 tips for securely managing BYOD in the workplace | OTAVA\",\"isPartOf\":{\"@id\":\"https:\/\/www.otava.com\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.otava.com\/blog\/top-10-tips-for-securely-managing-byod-in-the-workplace\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.otava.com\/blog\/top-10-tips-for-securely-managing-byod-in-the-workplace\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.otava.com\/wp-content\/uploads\/2019\/04\/Smartphones.jpg\",\"datePublished\":\"2014-02-07T00:00:00+00:00\",\"description\":\"The reason that BYOD is something you need to be aware of and to deal with is that the pressure from employees to support it will only continue to grow.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.otava.com\/blog\/top-10-tips-for-securely-managing-byod-in-the-workplace\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.otava.com\/blog\/top-10-tips-for-securely-managing-byod-in-the-workplace\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.otava.com\/blog\/top-10-tips-for-securely-managing-byod-in-the-workplace\/#primaryimage\",\"url\":\"https:\/\/www.otava.com\/wp-content\/uploads\/2019\/04\/Smartphones.jpg\",\"contentUrl\":\"https:\/\/www.otava.com\/wp-content\/uploads\/2019\/04\/Smartphones.jpg\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.otava.com\/blog\/top-10-tips-for-securely-managing-byod-in-the-workplace\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.otava.com\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Top 10 tips for securely managing BYOD in the workplace\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.otava.com\/#website\",\"url\":\"https:\/\/www.otava.com\/\",\"name\":\"OTAVA\u00ae\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\/\/www.otava.com\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.otava.com\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.otava.com\/#organization\",\"name\":\"OTAVA\u00ae\",\"url\":\"https:\/\/www.otava.com\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.otava.com\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.otava.com\/wp-content\/uploads\/2025\/03\/otava-logo.svg\",\"contentUrl\":\"https:\/\/www.otava.com\/wp-content\/uploads\/2025\/03\/otava-logo.svg\",\"caption\":\"OTAVA\u00ae\"},\"image\":{\"@id\":\"https:\/\/www.otava.com\/#\/schema\/logo\/image\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.otava.com\/#\/schema\/person\/35774075f8f4fcdd4eae80cb72034263\",\"name\":\"Irma Brillantes\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/secure.gravatar.com\/avatar\/d5251bebc1699793a698d1a6158603cb3cdc50a095a12357e42d415b3e5546c2?s=96&d=mm&r=g\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/d5251bebc1699793a698d1a6158603cb3cdc50a095a12357e42d415b3e5546c2?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/d5251bebc1699793a698d1a6158603cb3cdc50a095a12357e42d415b3e5546c2?s=96&d=mm&r=g\",\"caption\":\"Irma Brillantes\"},\"url\":\"https:\/\/www.otava.com\/blog\/author\/ibrillantesotava-com\/\"}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"Top 10 tips for securely managing BYOD in the workplace | OTAVA","description":"The reason that BYOD is something you need to be aware of and to deal with is that the pressure from employees to support it will only continue to grow.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.otava.com\/blog\/top-10-tips-for-securely-managing-byod-in-the-workplace\/","og_locale":"en_US","og_type":"article","og_title":"Top 10 tips for securely managing BYOD in the workplace","og_description":"The reason that BYOD is something you need to be aware of and to deal with is that the pressure from employees to support it will only continue to grow.","og_url":"https:\/\/www.otava.com\/blog\/top-10-tips-for-securely-managing-byod-in-the-workplace\/","og_site_name":"OTAVA","article_published_time":"2014-02-07T00:00:00+00:00","og_image":[{"url":"https:\/\/www.otava.com\/wp-content\/uploads\/2019\/04\/Smartphones.jpg","type":"","width":"","height":""}],"author":"Irma Brillantes","twitter_card":"summary_large_image","twitter_misc":{"Written by":"Irma Brillantes","Est. reading time":"11 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.otava.com\/blog\/top-10-tips-for-securely-managing-byod-in-the-workplace\/#article","isPartOf":{"@id":"https:\/\/www.otava.com\/blog\/top-10-tips-for-securely-managing-byod-in-the-workplace\/"},"author":{"name":"Irma Brillantes","@id":"https:\/\/www.otava.com\/#\/schema\/person\/35774075f8f4fcdd4eae80cb72034263"},"headline":"Top 10 tips for securely managing BYOD in the workplace","datePublished":"2014-02-07T00:00:00+00:00","mainEntityOfPage":{"@id":"https:\/\/www.otava.com\/blog\/top-10-tips-for-securely-managing-byod-in-the-workplace\/"},"wordCount":2139,"commentCount":0,"publisher":{"@id":"https:\/\/www.otava.com\/#organization"},"image":{"@id":"https:\/\/www.otava.com\/blog\/top-10-tips-for-securely-managing-byod-in-the-workplace\/#primaryimage"},"thumbnailUrl":"https:\/\/www.otava.com\/wp-content\/uploads\/2019\/04\/Smartphones.jpg","articleSection":["Information Technology Tips"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.otava.com\/blog\/top-10-tips-for-securely-managing-byod-in-the-workplace\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/www.otava.com\/blog\/top-10-tips-for-securely-managing-byod-in-the-workplace\/","url":"https:\/\/www.otava.com\/blog\/top-10-tips-for-securely-managing-byod-in-the-workplace\/","name":"Top 10 tips for securely managing BYOD in the workplace | OTAVA","isPartOf":{"@id":"https:\/\/www.otava.com\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.otava.com\/blog\/top-10-tips-for-securely-managing-byod-in-the-workplace\/#primaryimage"},"image":{"@id":"https:\/\/www.otava.com\/blog\/top-10-tips-for-securely-managing-byod-in-the-workplace\/#primaryimage"},"thumbnailUrl":"https:\/\/www.otava.com\/wp-content\/uploads\/2019\/04\/Smartphones.jpg","datePublished":"2014-02-07T00:00:00+00:00","description":"The reason that BYOD is something you need to be aware of and to deal with is that the pressure from employees to support it will only continue to grow.","breadcrumb":{"@id":"https:\/\/www.otava.com\/blog\/top-10-tips-for-securely-managing-byod-in-the-workplace\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.otava.com\/blog\/top-10-tips-for-securely-managing-byod-in-the-workplace\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.otava.com\/blog\/top-10-tips-for-securely-managing-byod-in-the-workplace\/#primaryimage","url":"https:\/\/www.otava.com\/wp-content\/uploads\/2019\/04\/Smartphones.jpg","contentUrl":"https:\/\/www.otava.com\/wp-content\/uploads\/2019\/04\/Smartphones.jpg"},{"@type":"BreadcrumbList","@id":"https:\/\/www.otava.com\/blog\/top-10-tips-for-securely-managing-byod-in-the-workplace\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.otava.com\/"},{"@type":"ListItem","position":2,"name":"Top 10 tips for securely managing BYOD in the workplace"}]},{"@type":"WebSite","@id":"https:\/\/www.otava.com\/#website","url":"https:\/\/www.otava.com\/","name":"OTAVA\u00ae","description":"","publisher":{"@id":"https:\/\/www.otava.com\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.otava.com\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.otava.com\/#organization","name":"OTAVA\u00ae","url":"https:\/\/www.otava.com\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.otava.com\/#\/schema\/logo\/image\/","url":"https:\/\/www.otava.com\/wp-content\/uploads\/2025\/03\/otava-logo.svg","contentUrl":"https:\/\/www.otava.com\/wp-content\/uploads\/2025\/03\/otava-logo.svg","caption":"OTAVA\u00ae"},"image":{"@id":"https:\/\/www.otava.com\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/www.otava.com\/#\/schema\/person\/35774075f8f4fcdd4eae80cb72034263","name":"Irma Brillantes","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/d5251bebc1699793a698d1a6158603cb3cdc50a095a12357e42d415b3e5546c2?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/d5251bebc1699793a698d1a6158603cb3cdc50a095a12357e42d415b3e5546c2?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/d5251bebc1699793a698d1a6158603cb3cdc50a095a12357e42d415b3e5546c2?s=96&d=mm&r=g","caption":"Irma Brillantes"},"url":"https:\/\/www.otava.com\/blog\/author\/ibrillantesotava-com\/"}]}},"_links":{"self":[{"href":"https:\/\/www.otava.com\/wp-json\/wp\/v2\/posts\/2783","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.otava.com\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.otava.com\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.otava.com\/wp-json\/wp\/v2\/users\/3"}],"replies":[{"embeddable":true,"href":"https:\/\/www.otava.com\/wp-json\/wp\/v2\/comments?post=2783"}],"version-history":[{"count":0,"href":"https:\/\/www.otava.com\/wp-json\/wp\/v2\/posts\/2783\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.otava.com\/wp-json\/wp\/v2\/media?parent=2783"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.otava.com\/wp-json\/wp\/v2\/categories?post=2783"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.otava.com\/wp-json\/wp\/v2\/tags?post=2783"},{"taxonomy":"other_category","embeddable":true,"href":"https:\/\/www.otava.com\/wp-json\/wp\/v2\/other_category?post=2783"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}