BYOD or BYOD policy is acronym for Bring Your Own Device is set of rules which leads IT departments to support for employee owned devices (usually notebooks, phones and tablets).
Questions tagged [byod]
18 questions
123
votes
12 answers
Is there a legitimate reason I should be required to use my company's computer? (BYOD prohibited)
I just got a new job at a medium-sized (~100 employees) company and one of the first things I was told is that I cannot use my own computer, because I need to be able to connect to their network, access files, etc. I didn't think that made much…
Marcus McLean
- 1,249
- 2
- 8
- 8
3
votes
2 answers
How we can prevent innocent looking USBNinja (USBHarpoon) attacks?
Is there anything we can do across the company to make sure USBNinja and other similar USB cables that looks so real for users can really be mitigated?
Filipon
- 1,204
- 10
- 22
3
votes
1 answer
How to block BYOD users from installing malicious versions of a common app?
How does Mobile Device Management tools (MDMs) identify mobile apps in order to allow to install only whitelisted applications?
First I though some kind of hash but because the APK changes in the Play Store I don't think so.
If it is the name in the…
Eloy Roldán Paredes
- 1,507
- 12
- 25
2
votes
0 answers
Implications of adding work account to an android device
Once there's a primary Google account registered on the device and then another work account is added in order to access G Suite of the work place, what are the G Suite administrators are able to access/modify on the phone?
Especially:
Are they…
Vic
- 121
- 4
2
votes
3 answers
How should security user training be provided when implementing a company BYOD strategy?
Our company is implementing a BYOD policy. I am working with management to draft end user training guidelines / standards as senior member of the Information Security team. Our company is in a regulated industry and works routinely with PII / PHI.…
Anthony
- 1,736
- 1
- 12
- 22
2
votes
2 answers
Get security certificate for secure Laptops etc
I am learning a bit about IT-Security and I wonder if there is a concept where you can get certificates for a specific device that approves the device is safe and not compromised.
Lets say you want to use you own Laptop at work but they need to be…
hadamard
- 125
- 3
2
votes
0 answers
Google/Apple account for corporate issued mobile phones
We are working on implementing MDM (Airwatch) for all corporate mobile devices (no BYOD will be allowed).
But I have a question as what is the best way to avoid users use their personal Gmail or Apple account to sing-in to the Play or iTunes?
I…
Dranik
- 233
- 1
- 3
- 8
2
votes
2 answers
xcodeghost infection in a byod device
We detected network traffic from a device infected with xcodeghost trying to reach a known bot command and control address. Obviously, we removed the device from the network. The user removed two applications that were mentioned in articles about…
mcgyver5
- 6,807
- 2
- 24
- 45
1
vote
0 answers
What are the most important security controls to implement when deploying BYOD in an organization?
In organizations like banks that have already many security controls. Will implementing BYOD (our organization employees will be able to use their own computers to access the organization when they decide to work remotely) in the company will…
Filipon
- 1,204
- 10
- 22
1
vote
2 answers
Hardening charity volunteers' access to a web server
I'm helping to administer a LAMP web server for a charity which runs CiviCRM on Joomla. This system is going to be accessed over the Internet by many volunteers from devices I have no control over.. Are there any professional tried-and-tested…
eug
- 111
- 3
1
vote
1 answer
COPE vs. BYOD - as an employee why should I be interested in BYOD?
I am curios what is the motivation for employees to go with BYOD?
As an employee why I should want to allow installation of MDM solution on my smartphone?
nickolay
- 119
- 1
1
vote
1 answer
Sent images on company WiFi network by accident
I know this was stupid, so I don't need to be told that...here goes:
I was at work and thought I was on 4G network on my Android phone but after sending a number of nude pics via a social media app and Gmail on my BYOD smartphone I realized I was…
qwerty
- 19
- 1
- 3
0
votes
1 answer
Forced to install certificate on my laptop when using company WiFi. Risk?
My company has a 'bring your own device' policy. You connect your device to the WiFi, and then open a citrix environment through a web portal. Basically, everything inside the citrix env is company-software/email. Outside is your own…
Jeremy
- 103
- 2
0
votes
2 answers
Personal computer - work VPN
My employer provided VPN software on our personal computers (VPN Tracker 365). When logged in, would my employer have access to my desktop files/folders? I have no issue of having anything to hide, just general expectations and concerns about…
0
votes
0 answers
To implement EAP-TLS for BYOD devices on a campus wireless network, should you use only machine authentication?
Like why would you need user authentication? If someone has an iPhone and is a member of the campus, he would only need a machine certificate for his iPhone so that only it can connect to the network right?
Zouzou Ibba
- 39
- 1
- 2
- 8