Bring Your Own Device (BYOD) Security Guide

byod security guide button ad 160x300 - Bring Your Own Device (BYOD) Security GuideIf you use your own device for work, it is your responsibility to safeguard your organization by securing your device and adhering to your organization’s file sharing and storage policies, among other requirements. This guide provides general direction on best practices most organizations will include in their policies. Be sure to note any requirements specific to your organization.

Follow these steps to get started:

  • Read and sign your organization’s technology policy. Make sure you understand and are prepared to comply with each setup and maintenance requirement.
  • Set up a new user on your device specifically for work use and limit non-admin users’ permissions for updating the device. DO NOT let other device users log in on your work user account.

Repeat these steps monthly and follow security guidelines and best practices closely (see SSR’s STOP > THINK > SECURE guide):

  • Run a web scanner ( If it returns a clean scan, proceed. If there are issues, troubleshoot and resolve.
  • Install/update the antivirus software your organization identified or provided. DO NOT search and select your own – these downloads are highly targeted by attackers opening your device up for security issues.
  • Make sure your operating system is up to date:
    1. Open Windows Updates (please note that Windows 7 is no longer supported – there are no further updates making it unsecure)
      • Windows 8.1:
        1. Click the Start button
        2. Click All Programs
        3. Click Windows Update
      • Windows 10:
        1. Click the Windows Start Menu
        2. Click Settings
        3. Click Updates & Security
    2. Click Check for updates
    3. If any updates are found, click Install updates

Summary: secure your organization’s network by securing your personal device

  • Know what your organization requires of you when you use your personal device for work
  • Prepare your device so you are the only user with access to your organization’s network
  • Secure and maintain your device on a monthly basis
  • Maintain good IT security habits
Recommended Posts