{"id":5450,"date":"2015-09-18T07:24:55","date_gmt":"2015-09-18T05:24:55","guid":{"rendered":"https:\/\/www.esferize.com\/security-in-the-company-with-byod\/"},"modified":"2021-10-01T13:24:06","modified_gmt":"2021-10-01T11:24:06","slug":"security-in-the-company-with-byod","status":"publish","type":"post","link":"https:\/\/www.esferize.com\/en\/security-in-the-company-with-byod\/","title":{"rendered":"Security in the company with BYOD"},"content":{"rendered":"<p>As you know, at\u00a0<a href=\"https:\/\/www.esferize.com\/en\/\" target=\"_blank\" rel=\"noopener noreferrer\">Esferize<\/a> we put special emphasis on everything related to <strong>security in the company<\/strong>. An often underestimated area that requires special attention. Because there is no better remedy than to be well protected so that nothing happens. That is why today we want to reflect on security in the company with BYOD, an increasingly common practice that becomes a danger if we do not use the <strong>appropriate security protocols and systems<\/strong>.<\/p>\n<h3>Bring Your Own Device (BYOD)<\/h3>\n<p><strong>Bring Your Own Device\u00a0(<a href=\"https:\/\/es.wikipedia.org\/wiki\/Bring_your_own_device\">BYOD<\/a>)\u00a0<\/strong>is a company policy whereby employees bring their own devices into the workplace to access company resources such as emails, databases and files on servers as well as personal data and applications. It is also known as Bring your own technology, as this expresses a much broader phenomenon, covering not only equipment but also software.<\/p>\n<p>Data from a study by F-Secure could not be more alarming. <strong>87% of European companies consent to the use of personal devices for work without taking into account their security or the use of their corporate data on those devices<\/strong>.<\/p>\n<p>This trend is on the rise within companies in general, but not so much for European companies in particular. Only 36% of them are committed to protecting their devices, which opens up the possibility of security holes that could put their confidential information at risk.<\/p>\n<h3>Security first<\/h3>\n<p>BYOD is creating big changes in the business world as around 90% of employees (in developed countries) use their computers in some way to access company information. Some believe that BYOD helps employees to be <strong>more productive<\/strong>. Others believe it boosts staff morale by allowing <strong>flexibility<\/strong> within the company. But to analyse the benefits, one would have to look at each case on a case-by-case basis. If left unchecked, this practice can be very detrimental to the company, as it can leave loopholes through which information can <strong>leak or malicious applications can be introduced into the network<\/strong>. For example, if an employee uses a smartphone to access the company network and then loses it, confidential information stored on the phone could find its way into unsecured hands.<\/p>\n<p><strong>One of the biggest challenges we must face with BYOD is to avoid tracking and access control to private and corporate networks.<\/strong> Devices to be connected by BYOD must have a wireless security protocol configured to prevent unwanted access. Mainly WPA2-Enterprise, which is the only level of wireless connection security that allows all three forms of security:<\/p>\n<ul>\n<li>Encryption of information in transit.<\/li>\n<li>User authenticity.<\/li>\n<li>Network authenticity.<\/li>\n<\/ul>\n<p>We hope that this information will help you to understand the possible risks that BYOD can pose and to implement preventive measures to mitigate these problems.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>As you know, at\u00a0Esferize we put special emphasis on everything  [&#8230;]<\/p>\n","protected":false},"author":7,"featured_media":5912,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[250,225,228],"tags":[794,793,355,356,260,232,795,235,796],"class_list":["post-5450","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-company","category-cybersecurity","category-security-on-the-internet","tag-bring-your-own-device-en-2","tag-bring-your-own-device-en","tag-business-mobility","tag-business-security","tag-byod-en","tag-cybersecurity","tag-risks","tag-security","tag-security-protocol"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.3 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Security in the company with BYOD (Bring Your Own Device) - Esferize<\/title>\n<meta name=\"description\" content=\"Security in the enterprise with BYOD, an increasingly common practice, is at risk if we do not use appropriate security protocols and systems.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.esferize.com\/en\/security-in-the-company-with-byod\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Security in the company with BYOD (Bring Your Own Device) - Esferize\" \/>\n<meta property=\"og:description\" content=\"Security in the enterprise with BYOD, an increasingly common practice, is at risk if we do not use appropriate security protocols and systems.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.esferize.com\/en\/security-in-the-company-with-byod\/\" \/>\n<meta property=\"og:site_name\" content=\"Esferize\" \/>\n<meta property=\"article:published_time\" content=\"2015-09-18T05:24:55+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2021-10-01T11:24:06+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.esferize.com\/wp-content\/uploads\/2015\/09\/woman-working-at-the-office-1-scaled.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1920\" \/>\n\t<meta property=\"og:image:height\" content=\"1280\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"esferize\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"esferize\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"2 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.esferize.com\\\/en\\\/security-in-the-company-with-byod\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.esferize.com\\\/en\\\/security-in-the-company-with-byod\\\/\"},\"author\":{\"name\":\"esferize\",\"@id\":\"https:\\\/\\\/www.esferize.com\\\/en\\\/#\\\/schema\\\/person\\\/9137a26404c991f5612837aacf59c0a3\"},\"headline\":\"Security in the company with BYOD\",\"datePublished\":\"2015-09-18T05:24:55+00:00\",\"dateModified\":\"2021-10-01T11:24:06+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.esferize.com\\\/en\\\/security-in-the-company-with-byod\\\/\"},\"wordCount\":449,\"publisher\":{\"@id\":\"https:\\\/\\\/www.esferize.com\\\/en\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.esferize.com\\\/en\\\/security-in-the-company-with-byod\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.esferize.com\\\/wp-content\\\/uploads\\\/2015\\\/09\\\/woman-working-at-the-office-1-scaled.jpg\",\"keywords\":[\"bring your own device\",\"bring your own device\",\"business mobility\",\"business security\",\"BYOD\",\"cybersecurity\",\"risks\",\"Security\",\"security protocol\"],\"articleSection\":[\"Company\",\"Cybersecurity\",\"Security on the Internet\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.esferize.com\\\/en\\\/security-in-the-company-with-byod\\\/\",\"url\":\"https:\\\/\\\/www.esferize.com\\\/en\\\/security-in-the-company-with-byod\\\/\",\"name\":\"Security in the company with BYOD (Bring Your Own Device) - Esferize\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.esferize.com\\\/en\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.esferize.com\\\/en\\\/security-in-the-company-with-byod\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.esferize.com\\\/en\\\/security-in-the-company-with-byod\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.esferize.com\\\/wp-content\\\/uploads\\\/2015\\\/09\\\/woman-working-at-the-office-1-scaled.jpg\",\"datePublished\":\"2015-09-18T05:24:55+00:00\",\"dateModified\":\"2021-10-01T11:24:06+00:00\",\"description\":\"Security in the enterprise with BYOD, an increasingly common practice, is at risk if we do not use appropriate security protocols and systems.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.esferize.com\\\/en\\\/security-in-the-company-with-byod\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.esferize.com\\\/en\\\/security-in-the-company-with-byod\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.esferize.com\\\/en\\\/security-in-the-company-with-byod\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.esferize.com\\\/wp-content\\\/uploads\\\/2015\\\/09\\\/woman-working-at-the-office-1-scaled.jpg\",\"contentUrl\":\"https:\\\/\\\/www.esferize.com\\\/wp-content\\\/uploads\\\/2015\\\/09\\\/woman-working-at-the-office-1-scaled.jpg\",\"width\":1920,\"height\":1280,\"caption\":\"Work. Girl in the office\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.esferize.com\\\/en\\\/security-in-the-company-with-byod\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Portada\",\"item\":\"https:\\\/\\\/www.esferize.com\\\/en\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Security in the company with BYOD\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.esferize.com\\\/en\\\/#website\",\"url\":\"https:\\\/\\\/www.esferize.com\\\/en\\\/\",\"name\":\"Esferize\",\"description\":\"Connect to the future\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.esferize.com\\\/en\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.esferize.com\\\/en\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.esferize.com\\\/en\\\/#organization\",\"name\":\"Esferize Comunicaciones S.L.\",\"url\":\"https:\\\/\\\/www.esferize.com\\\/en\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.esferize.com\\\/en\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/www.esferize.com\\\/wp-content\\\/uploads\\\/2019\\\/10\\\/logo.png\",\"contentUrl\":\"https:\\\/\\\/www.esferize.com\\\/wp-content\\\/uploads\\\/2019\\\/10\\\/logo.png\",\"width\":453,\"height\":100,\"caption\":\"Esferize Comunicaciones S.L.\"},\"image\":{\"@id\":\"https:\\\/\\\/www.esferize.com\\\/en\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/www.linkedin.com\\\/company\\\/esferize-comunicaciones\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.esferize.com\\\/en\\\/#\\\/schema\\\/person\\\/9137a26404c991f5612837aacf59c0a3\",\"name\":\"esferize\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/f66953701f5bf2c46cccb040020d9b0b9ab8daf3e9c85e663a53df18d6fd7170?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/f66953701f5bf2c46cccb040020d9b0b9ab8daf3e9c85e663a53df18d6fd7170?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/f66953701f5bf2c46cccb040020d9b0b9ab8daf3e9c85e663a53df18d6fd7170?s=96&d=mm&r=g\",\"caption\":\"esferize\"},\"url\":\"https:\\\/\\\/www.esferize.com\\\/en\\\/author\\\/esferize\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Security in the company with BYOD (Bring Your Own Device) - Esferize","description":"Security in the enterprise with BYOD, an increasingly common practice, is at risk if we do not use appropriate security protocols and systems.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.esferize.com\/en\/security-in-the-company-with-byod\/","og_locale":"en_US","og_type":"article","og_title":"Security in the company with BYOD (Bring Your Own Device) - Esferize","og_description":"Security in the enterprise with BYOD, an increasingly common practice, is at risk if we do not use appropriate security protocols and systems.","og_url":"https:\/\/www.esferize.com\/en\/security-in-the-company-with-byod\/","og_site_name":"Esferize","article_published_time":"2015-09-18T05:24:55+00:00","article_modified_time":"2021-10-01T11:24:06+00:00","og_image":[{"width":1920,"height":1280,"url":"https:\/\/www.esferize.com\/wp-content\/uploads\/2015\/09\/woman-working-at-the-office-1-scaled.jpg","type":"image\/jpeg"}],"author":"esferize","twitter_card":"summary_large_image","twitter_misc":{"Written by":"esferize","Est. reading time":"2 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.esferize.com\/en\/security-in-the-company-with-byod\/#article","isPartOf":{"@id":"https:\/\/www.esferize.com\/en\/security-in-the-company-with-byod\/"},"author":{"name":"esferize","@id":"https:\/\/www.esferize.com\/en\/#\/schema\/person\/9137a26404c991f5612837aacf59c0a3"},"headline":"Security in the company with BYOD","datePublished":"2015-09-18T05:24:55+00:00","dateModified":"2021-10-01T11:24:06+00:00","mainEntityOfPage":{"@id":"https:\/\/www.esferize.com\/en\/security-in-the-company-with-byod\/"},"wordCount":449,"publisher":{"@id":"https:\/\/www.esferize.com\/en\/#organization"},"image":{"@id":"https:\/\/www.esferize.com\/en\/security-in-the-company-with-byod\/#primaryimage"},"thumbnailUrl":"https:\/\/www.esferize.com\/wp-content\/uploads\/2015\/09\/woman-working-at-the-office-1-scaled.jpg","keywords":["bring your own device","bring your own device","business mobility","business security","BYOD","cybersecurity","risks","Security","security protocol"],"articleSection":["Company","Cybersecurity","Security on the Internet"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.esferize.com\/en\/security-in-the-company-with-byod\/","url":"https:\/\/www.esferize.com\/en\/security-in-the-company-with-byod\/","name":"Security in the company with BYOD (Bring Your Own Device) - Esferize","isPartOf":{"@id":"https:\/\/www.esferize.com\/en\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.esferize.com\/en\/security-in-the-company-with-byod\/#primaryimage"},"image":{"@id":"https:\/\/www.esferize.com\/en\/security-in-the-company-with-byod\/#primaryimage"},"thumbnailUrl":"https:\/\/www.esferize.com\/wp-content\/uploads\/2015\/09\/woman-working-at-the-office-1-scaled.jpg","datePublished":"2015-09-18T05:24:55+00:00","dateModified":"2021-10-01T11:24:06+00:00","description":"Security in the enterprise with BYOD, an increasingly common practice, is at risk if we do not use appropriate security protocols and systems.","breadcrumb":{"@id":"https:\/\/www.esferize.com\/en\/security-in-the-company-with-byod\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.esferize.com\/en\/security-in-the-company-with-byod\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.esferize.com\/en\/security-in-the-company-with-byod\/#primaryimage","url":"https:\/\/www.esferize.com\/wp-content\/uploads\/2015\/09\/woman-working-at-the-office-1-scaled.jpg","contentUrl":"https:\/\/www.esferize.com\/wp-content\/uploads\/2015\/09\/woman-working-at-the-office-1-scaled.jpg","width":1920,"height":1280,"caption":"Work. Girl in the office"},{"@type":"BreadcrumbList","@id":"https:\/\/www.esferize.com\/en\/security-in-the-company-with-byod\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Portada","item":"https:\/\/www.esferize.com\/en\/"},{"@type":"ListItem","position":2,"name":"Security in the company with BYOD"}]},{"@type":"WebSite","@id":"https:\/\/www.esferize.com\/en\/#website","url":"https:\/\/www.esferize.com\/en\/","name":"Esferize","description":"Connect to the future","publisher":{"@id":"https:\/\/www.esferize.com\/en\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.esferize.com\/en\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.esferize.com\/en\/#organization","name":"Esferize Comunicaciones S.L.","url":"https:\/\/www.esferize.com\/en\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.esferize.com\/en\/#\/schema\/logo\/image\/","url":"https:\/\/www.esferize.com\/wp-content\/uploads\/2019\/10\/logo.png","contentUrl":"https:\/\/www.esferize.com\/wp-content\/uploads\/2019\/10\/logo.png","width":453,"height":100,"caption":"Esferize Comunicaciones S.L."},"image":{"@id":"https:\/\/www.esferize.com\/en\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.linkedin.com\/company\/esferize-comunicaciones"]},{"@type":"Person","@id":"https:\/\/www.esferize.com\/en\/#\/schema\/person\/9137a26404c991f5612837aacf59c0a3","name":"esferize","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/f66953701f5bf2c46cccb040020d9b0b9ab8daf3e9c85e663a53df18d6fd7170?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/f66953701f5bf2c46cccb040020d9b0b9ab8daf3e9c85e663a53df18d6fd7170?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/f66953701f5bf2c46cccb040020d9b0b9ab8daf3e9c85e663a53df18d6fd7170?s=96&d=mm&r=g","caption":"esferize"},"url":"https:\/\/www.esferize.com\/en\/author\/esferize\/"}]}},"_links":{"self":[{"href":"https:\/\/www.esferize.com\/en\/wp-json\/wp\/v2\/posts\/5450","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.esferize.com\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.esferize.com\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.esferize.com\/en\/wp-json\/wp\/v2\/users\/7"}],"replies":[{"embeddable":true,"href":"https:\/\/www.esferize.com\/en\/wp-json\/wp\/v2\/comments?post=5450"}],"version-history":[{"count":0,"href":"https:\/\/www.esferize.com\/en\/wp-json\/wp\/v2\/posts\/5450\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.esferize.com\/en\/wp-json\/wp\/v2\/media\/5912"}],"wp:attachment":[{"href":"https:\/\/www.esferize.com\/en\/wp-json\/wp\/v2\/media?parent=5450"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.esferize.com\/en\/wp-json\/wp\/v2\/categories?post=5450"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.esferize.com\/en\/wp-json\/wp\/v2\/tags?post=5450"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}