

- #Employees using personal computers at work software
- #Employees using personal computers at work professional
Prohibiting the use of employee-owned devices is the best way to address these security issues, but may not be a viable option in today’s world. In addition, personal devices can easily be used by employees to obtain, store and transmit copies of key company documents that can be used in competing businesses. Personal devices are usually not protected from malware and hacking as well as internal company desktops.
#Employees using personal computers at work software
This proliferation of mobile devices, and software connecting the device to company networks, has significant potential to increase company efficiency, but it also creates risks.
#Employees using personal computers at work professional
Now, almost all professional and sales employees send and receive emails on a personal or company-owned work mobile device while away from the office, and an increasing number are accessing and editing documents, data and other resources using mobile devices. It was only little more than a decade ago that being able to access office emails with a Blackberry was a bit of a status symbol. A Fortinet survey of 4,000 workers from ages 20 to 29 found slightly more than half view it as their “right” to use their own mobile devices at work. Even if companies do not anticipate efficiencies from permitting the access of company resources with personal mobile devices, social pressures may force companies’ hands. BYOD can increase efficiency, as it allows companies to provide greater flexibility and anytime, anywhere access to company resources. Knowing your legal rights and responsibilities, as well as ensuring any breaches can be handled within state and industry regulations, you can be assured you and your employees are covered in the event of a threat.One increasingly popular business trend right now is BYOD (bring your own device), where employees use their own smartphones, tablets, laptops and other devices to access company resources for work purposes via the Cloud. Sometimes, no matter how secure a device or network is, hackers can get through. Considering cyber liability insurance.

If there's crossover between company access into personal data, state how the company will protect that personal information, and within what limits that protection is expressly stated. Before allowing access to the company data, be sure all parties, including management and IT, are explicitly clear on the policy rules. When an employee leaves the company or transfers to a department where their permissions change, there will be no surprises about what does and doesn't get wiped from the employee's device. Transparency about company access and monitoring of employee devices.Encouraging regular backups can also help. Requiring strong passwords, time-out locking, certain company-provided anti-virus and protective software, and setting up protocols for reporting a lost or stolen device right away.This ensures not only is the company-owned information protected from outside access, it keeps the employee's personal data private. Private cloud storage is also a viable option. Setting up a virtual desktop infrastructure (VDI) or mobile device management protocol to ringfence the company data from personal data.This is especially important with employees traveling internationally for business. Whether that means tracking business usage or prorating only a portion of the user's monthly cell phone or internet bill, keep the details transparent so there are no surprised. When personal devices are used, designate how expense reimbursement will work.Setting your employees' minds at ease about what is and isn't appropriate access by the company can go a long way toward making the device usage comfortable for all involved. Many employees are uncomfortable with their employers having access to much personal data, a ton of which is stored in their phone-location, personal photos, call logs, and contacts, just to name a few. Part of the benefit is letting the employee choose, but prohibiting jail-broken devices or certain apps that compromise security should be made immediately apparent in any BYOD policy. Be clear what sort of devices are appropriate.In a business meeting, having such immediate access to a phone can be a distraction, not a benefit. This can range from how much monitoring your IT department is allowed to have over their device, which contains their personal information, as well to when and where using the device is appropriate. Have a clear conduct policy with regards to personal devices.
