{"id":1590,"date":"2022-03-07T07:37:54","date_gmt":"2022-03-07T07:37:54","guid":{"rendered":"https:\/\/www.tokntechnology.com\/global?p=1590"},"modified":"2023-06-01T07:58:53","modified_gmt":"2023-06-01T07:58:53","slug":"byod-security-and-the-digital-enterprise","status":"publish","type":"post","link":"https:\/\/www.tokntechnology.com\/global\/byod-security-and-the-digital-enterprise\/","title":{"rendered":"BYOD, Security and the Digital Enterprise"},"content":{"rendered":"<div class=\"article-content\">\n<div id=\"block_5cde5a3e7e4a2\" class=\"text-content mb-12 full\">\n<p>According to Gartner, this year over half of all enterprise employers will require employees to supply their own device for work purposes (BYOD). But BYOD will increase risks and security is the top concern for BYOD.<\/p>\n<p>Infrastructure dependent \u2026\u2026\u2026.<\/p>\n<p>Traditionally companies use corporate perimeters bounded by firewalls to secure their environment. With the consumerisation of IT, those borders don\u2019t exist anymore. Apps have to be accessible to anyone at any time using any device. This means where there used to be a defined security perimeter, the border is now defined by the identity and access management process itself.<\/p>\n<p>The move to the cloud is unstoppable, companies are looking to move faster than ever. The issue is that many large corporates and government entities aren\u2019t using a single public cloud instance, often relying on a mix of on-premise, public cloud, hybrid cloud and private cloud scenarios. Companies like Microsoft with its Azure platform, and Amazon, with its AWS platform, are doing a good job with basic identity and access management but the fact is that that although they can control access to their applications, they can\u2019t always control access to the applications a company may have hosted in, or connected to, the cloud.<\/p>\n<p>If you have an on -premise ERP application, for example, a cloud ID service may not provide identity and access management for that application, while third party applications can.\u00a0 For the most part this is costly and only the large organisations, who can afford their own cloud infrastructure are able to adjust.<\/p>\n<p>TOKN supports\u00a0back-end integration, app management and app build toenable effective\u00a0manage data transfer.<\/p>\n<h3>Effective Data Management<\/h3>\n<p>CIOs have less control over mobile devices used in their organisation, which ultimately means they are more vulnerable to attacks. Using their own devices employees are downloading mobile apps and connecting to external Wi-Fi spots without always having the correct security protocols in place. According to\u00a0a study conducted by HP, 97% of employee\u2019s devices contained privacy issues, and 75% lacked adequate data encryption. This creates serious security concerns that can be exploited by hackers. This, coupled with the fact that your employees might not have anti-virus protection or have an up to date firewall present on their mobile devices, means they are more vulnerable to attacks.<\/p>\n<p>To prevent viruses spreading\u00a0it is important that there is a gatekeeper. TOKN\u2019s Connect service performs this function by verifying that the data being transferred from the mobile device to your IT network is encrypted and permitted.<\/p>\n<h3>Separate work from play<\/h3>\n<p>One of the most obvious BYOD security challenges is coping with the storage of work and personal data on the same device. Ultimately there are going to be certain types of corporate data that will be transferred to the organisation and stored locally on the device, so consideration needs to be given to the topic of securing this data.<\/p>\n<p>One of the biggest threats to mobile devices is malware that is installed unknowingly by the user, meaning malware could find its way onto the network.<\/p>\n<p>TOKN\u2019s secure client provides a secure delineation between work and play on the device<\/p>\n<h3>Remote control<\/h3>\n<p>The biggest risk in this area that IT departments fear is when employee\u2019s devices are lost or stolen, or even who has what device and what app\u2026\u2026According to an article in IT business edge, over half of\u00a0<a href=\"http:\/\/www.itbusinessedge.com\/blogs\/data-security\/lost-devices-cause-68-percent-of-health-care-data-breaches.html\" target=\"_blank\" rel=\"noopener\">security breaches<\/a>\u00a0occur when devices are stolen, it is therefore vital that companies are implementing encryption tactics to ensure that the device is secure against threats. A simple but effective way to ensure that employees secure their device is by prompting them to use even basic security protocols like using a device pin code.<\/p>\n<p>Furthermore Employees who don\u2019t keep their devices up to date are at further risk of being targeted by hackers. This includes mobile operating systems as well as install the apps<\/p>\n<p>TOKN device control service includes the enforcement of IT security protocols like pin codes, and remote wiping capabilities so that IT Managers have the power to wipe the device as soon as possible without having to ask for the user\u2019s permission.<\/p>\n<p>Contact us to hear more about TOKN\u2019s Digital Enterprise Mobility products and services<\/p>\n<\/div>\n<\/div>\n","protected":false},"excerpt":{"rendered":"<p>According to Gartner, this year over half of all enterprise employers will require employees to supply their own device for work purposes (BYOD). But BYOD will increase risks and security is the top concern for BYOD. Infrastructure dependent \u2026\u2026\u2026. Traditionally &hellip; <a href=\"https:\/\/www.tokntechnology.com\/global\/byod-security-and-the-digital-enterprise\/\">Read More<\/a><\/p>\n","protected":false},"author":1,"featured_media":1592,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"cybocfi_hide_featured_image":"","footnotes":""},"categories":[1],"tags":[],"class_list":["post-1590","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-articles"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v26.9 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>BYOD Security and the Digital Enterprise | TOKN Technology<\/title>\n<meta name=\"description\" content=\"Importance of BYOD security. Protect sensitive data, enable safe policies. Join us for robust BYOD solutions.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.tokntechnology.com\/global\/byod-security-and-the-digital-enterprise\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"BYOD Security and the Digital Enterprise | TOKN Technology\" \/>\n<meta property=\"og:description\" content=\"Importance of BYOD security. Protect sensitive data, enable safe policies. Join us for robust BYOD solutions.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.tokntechnology.com\/global\/byod-security-and-the-digital-enterprise\/\" \/>\n<meta property=\"og:site_name\" content=\"TOKN Technology\" \/>\n<meta property=\"article:published_time\" content=\"2022-03-07T07:37:54+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2023-06-01T07:58:53+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.tokntechnology.com\/global\/wp-content\/uploads\/2022\/03\/byod-security.png\" \/>\n\t<meta property=\"og:image:width\" content=\"600\" \/>\n\t<meta property=\"og:image:height\" content=\"295\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"TOKN\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"TOKN\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"4 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.tokntechnology.com\/global\/byod-security-and-the-digital-enterprise\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.tokntechnology.com\/global\/byod-security-and-the-digital-enterprise\/\"},\"author\":{\"name\":\"TOKN\",\"@id\":\"https:\/\/www.tokntechnology.com\/global\/#\/schema\/person\/9021954be94f8fa1d6a9c7be5d39e8bd\"},\"headline\":\"BYOD, Security and the Digital Enterprise\",\"datePublished\":\"2022-03-07T07:37:54+00:00\",\"dateModified\":\"2023-06-01T07:58:53+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.tokntechnology.com\/global\/byod-security-and-the-digital-enterprise\/\"},\"wordCount\":709,\"image\":{\"@id\":\"https:\/\/www.tokntechnology.com\/global\/byod-security-and-the-digital-enterprise\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.tokntechnology.com\/global\/wp-content\/uploads\/2022\/03\/byod-security.png\",\"articleSection\":[\"Articles\"],\"inLanguage\":\"en-AU\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.tokntechnology.com\/global\/byod-security-and-the-digital-enterprise\/\",\"url\":\"https:\/\/www.tokntechnology.com\/global\/byod-security-and-the-digital-enterprise\/\",\"name\":\"BYOD Security and the Digital Enterprise | TOKN Technology\",\"isPartOf\":{\"@id\":\"https:\/\/www.tokntechnology.com\/global\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.tokntechnology.com\/global\/byod-security-and-the-digital-enterprise\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.tokntechnology.com\/global\/byod-security-and-the-digital-enterprise\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.tokntechnology.com\/global\/wp-content\/uploads\/2022\/03\/byod-security.png\",\"datePublished\":\"2022-03-07T07:37:54+00:00\",\"dateModified\":\"2023-06-01T07:58:53+00:00\",\"author\":{\"@id\":\"https:\/\/www.tokntechnology.com\/global\/#\/schema\/person\/9021954be94f8fa1d6a9c7be5d39e8bd\"},\"description\":\"Importance of BYOD security. Protect sensitive data, enable safe policies. Join us for robust BYOD solutions.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.tokntechnology.com\/global\/byod-security-and-the-digital-enterprise\/#breadcrumb\"},\"inLanguage\":\"en-AU\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.tokntechnology.com\/global\/byod-security-and-the-digital-enterprise\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-AU\",\"@id\":\"https:\/\/www.tokntechnology.com\/global\/byod-security-and-the-digital-enterprise\/#primaryimage\",\"url\":\"https:\/\/www.tokntechnology.com\/global\/wp-content\/uploads\/2022\/03\/byod-security.png\",\"contentUrl\":\"https:\/\/www.tokntechnology.com\/global\/wp-content\/uploads\/2022\/03\/byod-security.png\",\"width\":600,\"height\":295},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.tokntechnology.com\/global\/byod-security-and-the-digital-enterprise\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.tokntechnology.com\/global\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"BYOD, Security and the Digital Enterprise\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.tokntechnology.com\/global\/#website\",\"url\":\"https:\/\/www.tokntechnology.com\/global\/\",\"name\":\"TOKN Technology\",\"description\":\"\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.tokntechnology.com\/global\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-AU\"},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.tokntechnology.com\/global\/#\/schema\/person\/9021954be94f8fa1d6a9c7be5d39e8bd\",\"name\":\"TOKN\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-AU\",\"@id\":\"https:\/\/www.tokntechnology.com\/global\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/f1f003cc25acb89f18e3a86519feac17e4249250252b76bf40123572798c2843?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/f1f003cc25acb89f18e3a86519feac17e4249250252b76bf40123572798c2843?s=96&d=mm&r=g\",\"caption\":\"TOKN\"},\"sameAs\":[\"https:\/\/www.tokntechnology.com\/global\"]}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"BYOD Security and the Digital Enterprise | TOKN Technology","description":"Importance of BYOD security. Protect sensitive data, enable safe policies. Join us for robust BYOD solutions.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.tokntechnology.com\/global\/byod-security-and-the-digital-enterprise\/","og_locale":"en_US","og_type":"article","og_title":"BYOD Security and the Digital Enterprise | TOKN Technology","og_description":"Importance of BYOD security. Protect sensitive data, enable safe policies. Join us for robust BYOD solutions.","og_url":"https:\/\/www.tokntechnology.com\/global\/byod-security-and-the-digital-enterprise\/","og_site_name":"TOKN Technology","article_published_time":"2022-03-07T07:37:54+00:00","article_modified_time":"2023-06-01T07:58:53+00:00","og_image":[{"width":600,"height":295,"url":"https:\/\/www.tokntechnology.com\/global\/wp-content\/uploads\/2022\/03\/byod-security.png","type":"image\/png"}],"author":"TOKN","twitter_card":"summary_large_image","twitter_misc":{"Written by":"TOKN","Est. reading time":"4 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.tokntechnology.com\/global\/byod-security-and-the-digital-enterprise\/#article","isPartOf":{"@id":"https:\/\/www.tokntechnology.com\/global\/byod-security-and-the-digital-enterprise\/"},"author":{"name":"TOKN","@id":"https:\/\/www.tokntechnology.com\/global\/#\/schema\/person\/9021954be94f8fa1d6a9c7be5d39e8bd"},"headline":"BYOD, Security and the Digital Enterprise","datePublished":"2022-03-07T07:37:54+00:00","dateModified":"2023-06-01T07:58:53+00:00","mainEntityOfPage":{"@id":"https:\/\/www.tokntechnology.com\/global\/byod-security-and-the-digital-enterprise\/"},"wordCount":709,"image":{"@id":"https:\/\/www.tokntechnology.com\/global\/byod-security-and-the-digital-enterprise\/#primaryimage"},"thumbnailUrl":"https:\/\/www.tokntechnology.com\/global\/wp-content\/uploads\/2022\/03\/byod-security.png","articleSection":["Articles"],"inLanguage":"en-AU"},{"@type":"WebPage","@id":"https:\/\/www.tokntechnology.com\/global\/byod-security-and-the-digital-enterprise\/","url":"https:\/\/www.tokntechnology.com\/global\/byod-security-and-the-digital-enterprise\/","name":"BYOD Security and the Digital Enterprise | TOKN Technology","isPartOf":{"@id":"https:\/\/www.tokntechnology.com\/global\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.tokntechnology.com\/global\/byod-security-and-the-digital-enterprise\/#primaryimage"},"image":{"@id":"https:\/\/www.tokntechnology.com\/global\/byod-security-and-the-digital-enterprise\/#primaryimage"},"thumbnailUrl":"https:\/\/www.tokntechnology.com\/global\/wp-content\/uploads\/2022\/03\/byod-security.png","datePublished":"2022-03-07T07:37:54+00:00","dateModified":"2023-06-01T07:58:53+00:00","author":{"@id":"https:\/\/www.tokntechnology.com\/global\/#\/schema\/person\/9021954be94f8fa1d6a9c7be5d39e8bd"},"description":"Importance of BYOD security. Protect sensitive data, enable safe policies. Join us for robust BYOD solutions.","breadcrumb":{"@id":"https:\/\/www.tokntechnology.com\/global\/byod-security-and-the-digital-enterprise\/#breadcrumb"},"inLanguage":"en-AU","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.tokntechnology.com\/global\/byod-security-and-the-digital-enterprise\/"]}]},{"@type":"ImageObject","inLanguage":"en-AU","@id":"https:\/\/www.tokntechnology.com\/global\/byod-security-and-the-digital-enterprise\/#primaryimage","url":"https:\/\/www.tokntechnology.com\/global\/wp-content\/uploads\/2022\/03\/byod-security.png","contentUrl":"https:\/\/www.tokntechnology.com\/global\/wp-content\/uploads\/2022\/03\/byod-security.png","width":600,"height":295},{"@type":"BreadcrumbList","@id":"https:\/\/www.tokntechnology.com\/global\/byod-security-and-the-digital-enterprise\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.tokntechnology.com\/global\/"},{"@type":"ListItem","position":2,"name":"BYOD, Security and the Digital Enterprise"}]},{"@type":"WebSite","@id":"https:\/\/www.tokntechnology.com\/global\/#website","url":"https:\/\/www.tokntechnology.com\/global\/","name":"TOKN Technology","description":"","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.tokntechnology.com\/global\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-AU"},{"@type":"Person","@id":"https:\/\/www.tokntechnology.com\/global\/#\/schema\/person\/9021954be94f8fa1d6a9c7be5d39e8bd","name":"TOKN","image":{"@type":"ImageObject","inLanguage":"en-AU","@id":"https:\/\/www.tokntechnology.com\/global\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/f1f003cc25acb89f18e3a86519feac17e4249250252b76bf40123572798c2843?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/f1f003cc25acb89f18e3a86519feac17e4249250252b76bf40123572798c2843?s=96&d=mm&r=g","caption":"TOKN"},"sameAs":["https:\/\/www.tokntechnology.com\/global"]}]}},"_links":{"self":[{"href":"https:\/\/www.tokntechnology.com\/global\/wp-json\/wp\/v2\/posts\/1590","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.tokntechnology.com\/global\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.tokntechnology.com\/global\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.tokntechnology.com\/global\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.tokntechnology.com\/global\/wp-json\/wp\/v2\/comments?post=1590"}],"version-history":[{"count":0,"href":"https:\/\/www.tokntechnology.com\/global\/wp-json\/wp\/v2\/posts\/1590\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.tokntechnology.com\/global\/wp-json\/wp\/v2\/media\/1592"}],"wp:attachment":[{"href":"https:\/\/www.tokntechnology.com\/global\/wp-json\/wp\/v2\/media?parent=1590"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.tokntechnology.com\/global\/wp-json\/wp\/v2\/categories?post=1590"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.tokntechnology.com\/global\/wp-json\/wp\/v2\/tags?post=1590"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}