Skip to main content
  • Login
  • Support
  • Partnerships
    • Partnerships Overview
    • Solution Provider Program
    • Technology Alliance Program
    • Distributor Program
N-able
  • Request a Quote
  • Try Now
    • N-able RMM
    • N-able N-central
    • N-able Backup
    • MSP Manager
    • N-able Mail Assure
    • N-able Passportal
    • N-able Risk Intelligence
    • N-able Take Control
Request quote
N-able
  • Products
    • Monitoring & Management
    • N-central Automate. Tackle complex networks. Get remote monitoring and management built for efficiency and scale.
    • RMM Start fast. Grow at your own pace. Try this powerful but easy remote monitoring and management solution.
    • Backup
    • Backup Get data protection for servers, workstations, applications, documents, and Microsoft 365 from one dashboard.
    • Security
    • EDR Defend against ransomware, zero-day attacks, and evolving threats with endpoint detection and response.
    • Mail Assure Leverage mail protection and archiving to keep your users safe from email threats and downtime.
    • Passportal Adopt and enforce best practices for password and documentation management with ease.
    • Tools & Services
    • MSP Manager Increase helpdesk efficiency with a robust PSA, ticketing, reporting, and billing management solution.
    • Take Control Help support customers and their devices with remote support tools designed to be fast and powerful.
    • View All
  • Solutions

    Solutions

    • Security Protect your customers and expand your business by offering layered security services without the complexity.
    • Monitoring Choose the right remote monitoring and management solution to meet you where you are and grow with you.
    • Operational Efficiency Boost profits by improving efficiency via automation, resources and training, and time-saving products.
    • IT Departments Keep your organization productive by easily managing IT from a single, easy-to-use, web-based dashboard.
    • Remote Monitoring Solutions Comparison Compare N-able RMM and N-central side by side. Sign up to talk to a specialist to find the right fit.
    • View All
  • Resources
    • Download
    • Resource Library
    • Product Information
    • Free Tools
    • Learn
    • MSP Institute Webinar Series
    • Daily Live Demos
    • MSP Advice Project
    • Ask the N-central Experts
    • Upcoming Webcasts
    • Connect
    • Blog
    • Security Resource Center
    • Events
    • RMM Foundations Training
  • About
    • Company
    • About Us
    • Leadership
    • Careers
    • News & Press
    • Awards & Recognition
    • Support & Policies
    • Customer Success
    • Customer Support
    • Legal
    • Security
    • Get in Touch
    • Contact
    • Get a Quote
    • Worldwide Sales & Support
  • IT Departments
  • Contact Sales
    • Contact Sales
    • General Inquiry
    • Get a Quote
    • Worldwide Sales & Support
    • Talk to Specialist
    • Security Solutions
    • Monitoring Solutions
    • Operational Efficiency
  • Try Now
    • Monitoring & Management
    • N-central
    • RMM
    • Backup
    • Security
    • EDR
    • Mail Assure
    • Passportal
    • Tools & Services
    • MSP Manager
    • Take Control
SolarWinds MSP is becoming Read More
Filter Blogs
  • Filter by:
  • MSP Business
    • Automation
    • Backup & Disaster Recovery
    • Security-series
    • Best Practices
    • Business
    • Business Growth
    • Business Risk
    • Cloud Computing
    • Customer Service
    • Cybersecurity
    • Cybersecurity Awareness Month
    • Data
    • GDPR
    • Internet of Things
    • IT Support
    • ITSM
    • LOGICcards
    • Machine Learning
    • Mail
    • Managed Services
    • Marketing
    • Mobile
    • Networking
    • Operations
    • Podcast
    • Product
    • PSA
    • Remote Management
    • Research & Trends
    • Risk Intelligence
    • Security
    • Security Vlog
    • Service Desk
    • Services & Support
    • The Head Nerds
    • Tips & Advice
    • Training
Home Blog MSP Business Security BYOD Policy Overview: Good Idea or Risky Business?
Security

BYOD Policy Overview: Good Idea or Risky Business?

By SolarWinds MSP
5 March, 2020

Over the past couple of decades, employees have increasingly used their own personal devices for their work. From checking into corporate systems on home laptops to sending emails on their smartphones after hours, using personal devices has allowed workers to improve productivity while offering incredible convenience. 

However, it can open businesses up to security risks. For instance, a personal smartphone rarely carries the same level of security that a corporately managed device will. As a result, many businesses have implemented bring your own device (BYOD) policies allowing employees to use the technology of their choice while still giving businesses some control. Yet BYOD policies still bring some risks for the businesses using them. This blog will look at these nuances so you can make a smarter decision on whether or not to use a BYOD policy. 

Caution: Nothing in this post constitutes legal advice. Please consult with legal counsel before developing BYOD policies. 

What are the risks of BYOD?

CTA Image

N-able Remote Monitoring and Management

Get the tools you need to manage, secure, and improve all things IT—all within a single web-based dashboard.

Try It Free Learn More

BOYD policies can help your customers improve productivity and even morale by allowing employees to use technology they prefer and are already comfortable with. However, there are some risks. 

For starters, letting employees bring personal devices to work can increase network security risks. For example, some employees won’t stay current with updates on their phones or laptops unless they’re actively managed by the IT team. This can open your customers’ networks to significant vulnerabilities. Plus, there’s an increased potential for data breaches. For example, if an employee allows their family to use their personal laptop or tablet at home, that family member could technically gain unauthorized access to your corporate resources. While this can occur if the employee takes a company-issued device home as well, it could be a greater risk if the employee owns the device. 

This brings up another major risk—ownership. If you allow users to access company resources using a smartphone (either their own or company-issued), you may have to wipe the device if it’s lost. Employees may lose personal data in the process. If you don’t explicitly point this out in your BYOD policy, you could increase the chances of a lawsuit. 

Considerations for a BYOD strategy

If you decide to implement a BYOD strategy, there are a few things to consider. Again, make sure to consult with legal counsel before you embark on BYOD services. 

  • Create a fair use policy: Whether offering BYOD or not, you should outline a fair-use policy around company data and devices. You need to delineate who owns data, who owns property, and what people can and can’t do with company resources. If you offer BYOD, you should consider incorporating elements from that policy into your fair-use policy. 
  • Set clear security policies: Outline minimum security policies for any personal devices. For example, all phones should be password protected with strong pins, preferably using a mix of numbers and letters. Devices should also be encrypted and you should consider having a list of banned and approved applications. Also, consider listing out approved and banned devices. For example, you’ll likely want to ban the use of jailbroken iPhones. 
  • Define support levels: Decide how much support you’ll offer for personal devices. You may opt to offer complete support for personal devices or require the employee to fix their own devices by calling their vendor’s support line. Either is acceptable—greater support means more productivity for clients but also means more work on your team’s part.
  • Draw clear lines around data: This was mentioned this under fair-use policy, but it’s worth reiterating—you’ll need to clearly outline who owns data. Make it clear that the company owns all relevant data created for the company and outline how you’ll handle any personal and private data contained on the device. 
  • Set expectations around lost devices: If a device is lost or stolen, you’ll need to remotely lock and wipe it so proprietary data doesn’t fall into the wrong hands. Wiping a device typically removes all data, and users may be surprised when they lose personal photos or videos. Make sure to outline this in your policies and also consider reminding customers in user trainings to back up their personal data. 

Beyond your BYOD policy, don’t forget to keep other security layers in place. This means protecting employer-owned machines with patching, endpoint protection, and backup. Also, consider segmenting networks to prevent devices from spreading malware across the network. You may even consider requiring BYOD devices to be put on a guest network while company-provided devices connect to the main corporate network. 

Is BYOD a good idea?

Ultimately, it’s your call on whether to wade into the BYOD waters for your customers. On one hand, there are a lot of benefits for clients, from improved employee morale and convenience to enhanced productivity. On the other hand, you may end up responsible for more than you bargained for. Regardless, if you do start a BYOD program, make sure to consult with legal counsel along the way. You have to protect your own reputation and your customers’ just as much as you have to protect their employees’ data.

 

Whether you decide to offer BYOD to your clients or not, it helps to have multiple layers of security in place. SolarWinds® RMM offers multiple layers of security in one web-based console—from patch management to endpoint detection and response to backup and recovery. And it offers mobile device management features that let you track and remotely wipe mobile devices as needed. Learn more today. 

Additional reading

Common BYOD Challenges
Five BYOD best practices for MSPs and their customers
BYOD: Bring Your Own Destruction!
You might also like...
Security

DearCry Ransomware Review 

Security

Endpoint security for Mac: What you need to know In 2021

Security

A guide to patch management policies for MSPs

Security

A Beginner's Guide to Unified Endpoint Management

Mail

How to Detect and Prevent Business Email Compromise

Security

Intrusion Detection System (IDS): Signature vs. Anomaly-Based

Want to stay up to date?

Get the latest MSP tips, tricks, and ideas sent to your inbox each week.

Loading form....

If the form does not load in a few seconds, it is probably because your browser is using Tracking Protection. This is either an Ad Blocker plug-in or your browser is in private mode. Please allow tracking on this page to request a subscription.

Note: Firefox users may see a shield icon to the left of the URL in the address bar. Click on this to disable tracking protection for this session/site

Recent Posts
  • DearCry Ransomware Review 
  • PSA vs ITSM vs ESM: Part 2—Which is the right fit for your MSP?
  • 4 ways PSA software helps MSP businesses
  • PSA vs ITSM vs ESM: Part 1—What do they do? 
  • Endpoint security for Mac: What you need to know In 2021
Categories:
  • Security (252)
  • Tips & Advice (130)
  • Backup & Disaster Recovery (97)
  • Best Practices (97)
  • Managed Services (89)
  • The Head Nerds (88)
  • Business Growth (79)
  • IT Support (43)
  • Business (42)
  • Automation (41)
  • Operations (38)
  • Cybersecurity (37)
  • Mail (37)
  • Remote Management (31)
  • ITSM (26)
  • Data (23)
  • Networking (22)
  • Cloud Computing (21)
  • PSA (16)
  • Marketing (15)
  • Product (11)
  • Service Desk (7)
  • Services & Support (5)
  • Mobile (4)
  • Risk Intelligence (4)
  • Customer Service (3)
  • GDPR (3)
  • Internet of Things (3)
  • Training (2)
  • Research & Trends (2)
  • LOGICcards (1)
  • Cybersecurity Awareness Month (1)
  • Business Risk (1)
Show moreless
N-able

Products
  • N-able RMM
  • N-able N-central
  • N-able Backup
  • N-able EDR
  • N-able MSP Manager
  • N-able Mail Assure
  • N-able Risk Intelligence
  • N-able Take Control
  • N-able Passportal
  • All Products Use Cases
Solutions
  • Security Solutions
  • Monitoring Solutions
  • Efficiency Solutions
  • Identify which RMM solution is right for me
  • Drive Efficiency with Automation
  • Manage my MSP Business More Efficiently
  • Manage my IT Department More Efficiently
  • Layered Security
  • Cross-Platform Support
  • Data-Driven Insights
About
  • About Us
  • Careers
  • Newsroom
  • Leadership Team
  • Upcoming Events
  • Subscription Preferences
  • COVID-19 Response
Support
  • N-able RMM
  • N-able N-central
  • N-able Backup
  • N-able Mail Assure
  • N-able Take Control
  • N-able MSP Manager
  • N-able Risk Intelligence
  • N-able Threat Monitor
  • N-able Passportal
  • N-able Take Control Downloads
  • Backup & Recovery Downloads
  • Service Status

Footer 2

  • Legal Documents
  • Privacy
  • California Privacy Rights
  • Security Information
  • Sitemap

© N-able Solutions ULC and N-able Technologies Ltd.
All rights reserved.