Three Major BYOD Security Vulnerabilities

Date posted: 2/12/18, 10:29 AM

BYOD.jpegInnovation is a human trait that drives technological advances. Unfortunately, scientists, engineers, designers and other professionals aren't the only ones with this ability. Hackers and malware developers are equally adept. As a result, network security is becoming increasingly challenging as hackers and malware developers expand their repertoire.

Often, their techniques are less about innovation than merely exploiting the opportunities created by new technology, such as mobile devices. If your business has a bring-your-own device (BYOD) policy, make sure you protect against these three security issues:

Public Wi-Fi Networks

If your employees use their own computing devices and they frequent a nearby restaurant or coffee shop, cybercriminals intent on penetrating your network can exploit this by setting up fake WAPs (wireless access points) at this corporate "watering hole." Employees wishing to use the public Wi-Fi connect to a fake WAP instead.

People often use the same passwords for different accounts, and some of your employees may connect to the fake WAP with the same password they use to log into your corporate network. Hackers can also access unprotected data sent via the WAP and may infect or take control of the employee's device. The more popular the watering hole is with your employees, the better the hacker's prospects are for gaining a foothold into your network.

Device Loss and Theft

Personal devices kept on an employee's person are brought and used wherever they go. Absent mindedness or a distraction may cause the staff member to leave the device behind in a public place. People misplace their wallets and keys in this way, and there's no reason it won't ever happen to a device containing important corporate data and network-login credentials.

Devices too large for carrying around, such as tablets and laptops, are commonly left inside a parked car while an employee conducts personal business. Car theft or break-ins results in stolen devices — and therefore stolen data.

Mobile-Device Disposal

Most dumpster divers aren't interested in cashing in on recyclables. Instead, they're after the stored data inside tossed-out computers, laptops, tablets, and smartphones. Even if your business properly disposes of its old computers, the same may not be true of your employee's personal devices.

File deletion isn't enough because data-recovery technology can readily extract deleted data. In fact, it's possible to retrieve data from physically damaged memory devices. Hackers doing reconnaissance on a business may check nearby dumpsters for computing devices. Other people may sell the data at black markets to others with the ability to exploit it.

Finally, employees who fail to keep their devices' software and anti-virus up to date may expose your network to malware and other infections.

For answers to your network-security concerns, contact TelWare at 1-800-637-3148 or sales@telware.comTelWare is a national leader in the installation of voice, video, and data solutions.



Most Recent Posts

TelWare has ensured that OneCloud products allow external calls to the 988 number today, without the need for any dial-out prefix.


Most of us learn from a fairly young age that, in the instance of a true emergency, there is a simple step we can take to seek help: Just pick up a phone and dial 911. Actually, it may not be quite as simple as that.


For most businesses, a speedy Internet connection is absolutely essential. The question is, what’s the bandwidth your team requires for optimal performance?


© 2021 TelWare Corporation. All rights reserved.

bbb 1.png