PaymentsJournal
No Result
View All Result
SIGN UP
  • Commercial
  • Credit
  • Debit
  • Digital Assets & Crypto
  • Digital Banking
  • Emerging Payments
  • Fraud & Security
  • Merchant
  • Prepaid
PaymentsJournal
  • Commercial
  • Credit
  • Debit
  • Digital Assets & Crypto
  • Digital Banking
  • Emerging Payments
  • Fraud & Security
  • Merchant
  • Prepaid
No Result
View All Result
PaymentsJournal
No Result
View All Result

Overcoming the Cybersecurity Dangers of BYOD

By Kim Del Fierro
August 21, 2018
in Industry Opinions
0
4
SHARES
0
VIEWS
Share on FacebookShare on TwitterShare on LinkedIn
cybersecurity, prepaid home internet

cybersecurity

In today’s high tech world, nearly everyone you meet owns a smartphone, tablet or laptop computer. And in the era of BYOD, any and all of these devices are being used for work.

While that is certainly a convenience for employees and employers alike, for the men and women who sit in the CIO’s chair, BYOD is a source of constant headaches and frustration. Data breaches can happen at any time in the most controlled environments, and personal devices ensure a loss of control that keeps CIOs and data security teams up at night.

Personal Device Use by the Numbers

Indeed, recent survey data from Finn Partners paints a grim picture surrounding the use of personal security devices by employees. While a full 55 percent of employees BYOD, only 26 percent change log-in credentials on a monthly basis. Only 25 percent of these employees update the security protocols and operating systems on their devices each month.

When you look at phishing, the root cause of 95 percent of all breaches, the numbers grow darker still. In the June 2018 Finn Partners survey, nearly 40 percent of employees admitted to clicking on a link or opening an attachment from a sender they didn’t recognize. Two out of every five employees admit to putting their companies at risk both in the office and on their own devices. It should come as no surprise that one in three of these employees reports having been a victim of a cyber-attack or data breach.

Solutions in Sight

There are a number of steps an organization can take to minimize the risks that stem from BYOD policies. IT departments can work to limit access to company documents and records for smartphones and tablets. It can ensure that all data downloaded is fully encrypted. Cybersecurity professionals can and should enforce remote wipe policies and passcode locks on all devices being used for company use.

But in an era where nearly 40 percent of employees are going to click a link or open an attachment from someone they don’t know, in spite of years of training and workshops teaching them not to do so, smart cybersecurity teams will need to take solutions to the next level. The best recourse is to stop phishing attacks at the source before an employee even has the opportunity to make a company-changing mistake.

Take the Next Step in Cybersecurity

You’ll accomplish this by using preemptive anti-phishing solutions that stop phishing attacks from even entering your employee’s devices. That way you won’t have to worry about whether your employees will encounter phishing attacks at all. The risk of them compromising your organization’s sensitive data will be reduced to an all-time minimum. Taking this one step, while at the same time maintaining a continuous program of cyber hygiene, will eliminate nearly all cybersecurity threats to your company.

At Area 1 Security, we are dedicated to stopping phishing attacks with our comprehensive anti-phishing solution, Area 1 Horizon. It protects your organization across all traffic vectors, and, best of all — you’ll only be paying for phish we catch. We will help you help your employees, and in so doing, allow security professionals with BYOD policies to enjoy a better night’s sleep.

4
SHARES
0
VIEWS
Share on FacebookShare on TwitterShare on LinkedIn
Tags: Cybersecurity

    Get the Latest News and Insights Delivered Daily

    Subscribe to the PaymentsJournal Newsletter for exclusive insight and data from Javelin Strategy & Research analysts and industry professionals.

    Must Reads

    commercial card, Allpay ClearBank Prepaid Payments, wealth transfer

    How Banks Can Capture the Wealth Transfer from Boomers to Gen Z

    June 20, 2025
    embedded lending

    Embedded Lending as a Growth Strategy for ISVs—How to Maximize Revenue Potential

    June 18, 2025
    merchant ai

    Merchants Find More Use Cases for AI Amid Risks

    June 17, 2025
    prepaid payroll

    Taking the Check Out of Paycheck: The Role of Prepaid in Payroll

    June 16, 2025
    Banking-as-a-service BaaS

    Remodeling Main Street: How Community Banks Can Leverage the Banking-as-a-Service Paradigm

    June 12, 2025
    How Employee Performance Enhances the Customer Experience

    Three Strategies to Maximize Loyalty in the AI-Driven World 

    June 11, 2025
    PFM tools

    How FIs Are Cutting Through Subscription Clutter with PFM Tools

    June 10, 2025
    child identity theft

    Stranger Danger: Protecting Your Children from Identity Theft

    June 9, 2025

    Linkedin-in X-twitter
    • Commercial
    • Credit
    • Debit
    • Digital Assets & Crypto
    • Digital Banking
    • Commercial
    • Credit
    • Debit
    • Digital Assets & Crypto
    • Digital Banking
    • Emerging Payments
    • Fraud & Security
    • Merchant
    • Prepaid
    • Emerging Payments
    • Fraud & Security
    • Merchant
    • Prepaid
    • About Us
    • Advertise With Us
    • Sign Up for Our Newsletter
    • About Us
    • Advertise With Us
    • Sign Up for Our Newsletter

    ©2024 PaymentsJournal.com |  Terms of Use | Privacy Policy

    • Commercial Payments
    • Credit
    • Debit
    • Digital Assets & Crypto
    • Emerging Payments
    • Fraud & Security
    • Merchant
    • Prepaid
    No Result
    View All Result