News & Insights
How to manage BYOD with ‘Plan B’ announced in England

How to manage ‘BYOD’ with Plan B recently being announced, we thought it would be a good time to remind our visitors about a recent update from our good friends at the National Cyber Security Centre, specifically focussing on Bring Your Own Device (BYOD) policies.
There are a number of key considerations for organisations to take when considering BYOD for short / long term measures to deal with the Pandemic and changing landscape. Digital Transformation has encouraged the use of BYOD which in turn has created a number of headaches for your Technical teams. How can they protect their data if they’re not protecting or managing the device used to access the data?
This post will provide you with some crucial questions to ask which will need to be thoroughly considered when thinking about implementing such a policy across your organisation.
The four (4) key questions to consider when thinking about how to manage ‘BYOD’ within your organisation are:
- What do your employees need to access to work efficiently?
- Do your employees have access to the right tools /software on their device(s) in order to meet expectations?
- How can you protect YOUR data on these devices? Are you utilising cloud services? Can you enforce minimum device health policies?
- Can you trust the device(s) being added to your network?
If you’d like to read the post in full, you can access the blog here.
Hopefully, these four simple questions will help you on your BYOD journey, however if you’d like to discuss further with the team, please don’t hesitate to contact us on hello@fourtify.co.uk.
Categories
- Consultancy
- Cyber Essentials for Small Businesses
- Funded Cyber Essentials Programme
- Cyber Essentials – Grace Period for Technical Controls
- IASME and British Chamber of Commerce: Chamber Cyber Essentials Partnership
- Cyber Assurance Level 1 & Level 2 Certification: FAQs
- The IASME Cyber Assurance Standard
- Fourtify’s Cyber Security FAQ’s
- E-mail Security
- The rise of Ransomware-as-a-Service (RaaS)
- Cyber Essentials & Cyber Essentials Plus
- Cyber Awareness
- Sophos Intercept X achieves ‘AAA’ Protection
- Cyber Essentials FAQs
- What is the difference between Phishing and Blagging?
- Diminish Cyber Threats with Sophos Intercept X
- Cyber Assurance Level 1 & Level 2 Certification: FAQs
- The IASME Cyber Assurance Standard
- Fourtify’s Cyber Security FAQ’s
- E-mail Security
- The rise of Ransomware-as-a-Service (RaaS)
- Cyber Essentials 3.0 will be launching in January 2022
- Stay Safe Online this Christmas.
- Cyber Essentials & Cyber Essentials Plus
- Cyber Essentials
- Cyber Essentials Montpellier (3.1)
- Cyber Security for Charities
- Cyber Essentials for Small Businesses
- Funded Cyber Essentials Programme
- Cyber Essentials – Grace Period for Technical Controls
- Cyber Essentials FAQs
- IASME and British Chamber of Commerce: Chamber Cyber Essentials Partnership
- What is the difference between Phishing and Blagging?
- Diminish Cyber Threats with Sophos Intercept X
- The IASME Cyber Assurance Standard
- Fourtify’s Cyber Security FAQ’s
- Update to Fees for Cyber Essentials Certification
- Cyber Essentials 3.0 will be launching in January 2022
- Cyber Essentials & Cyber Essentials Plus
- IASME Cyber Assurance
- IASME Cyber Baseline
- Remote Working