It’s only natural that employees will want to check e-mail and do other work-related activities from home or on the road and with today’s proliferation of smart phones, tablets, and more - they will want to access work files and information using their own personal devices. But be careful! By allowing employees to access company resources with personal devices, you could be opening up a serious security loophole.
Since these personal devices aren’t company owned and regulated, you have limited access and control over how they are used. Employees can easily download malware and viruses and infect your network when they connect, send e-mails or transfer files. Another risk is the security of the device. If an employee loses or misplaces a device with confidential client information on it, it puts a responsibility on YOU to notify your clients of the potential exposure and can lead to a costly PR nightmare or costly security breach.
This is not to say you shouldn’t allow employees to use personal devices – but if you do, then you need to make sure these devices are being secured and backed up like every other device in your network. The type of remote security monitoring you need will depend on the device, the information being stored or accessed, and the laws regarding the information you store for patients or clients.
If you are interested in learning more about developing a concrete and effective IT security policy for personal device use as well as general system access, please don’t hesitate to give us a call so we can sit down with you and discuss a custom security blueprint that’s just right for you.