Sign in to view more content

Create your free account or sign in to continue your search

Welcome back

By clicking Continue to join or sign in, you agree to LinkedIn’s User Agreement, Privacy Policy, and Cookie Policy.

New to LinkedIn? Join now

or

New to LinkedIn? Join now

By clicking Continue to join or sign in, you agree to LinkedIn’s User Agreement, Privacy Policy, and Cookie Policy.

Skip to main content
LinkedIn
  • Articles
  • People
  • Learning
  • Jobs
  • Games
Join now Sign in
  1. All
  2. Engineering
  3. Information Systems

Your team is using personal devices for work. How do you ensure data security standards are maintained?

When your team uses personal devices for work, maintaining data security might seem daunting. Here's how to uphold standards effectively:

- Implement a comprehensive Bring Your Own Device (BYOD) policy that clearly defines acceptable use and security requirements.

- Ensure all devices have updated antivirus software and secure connections, like VPNs, when accessing company data.

- Regularly conduct security training sessions to keep everyone aware of potential risks and best practices.

What strategies do you think are most effective for securing data on personal devices?

Information Systems Information Systems

Information Systems

+ Follow
  1. All
  2. Engineering
  3. Information Systems

Your team is using personal devices for work. How do you ensure data security standards are maintained?

When your team uses personal devices for work, maintaining data security might seem daunting. Here's how to uphold standards effectively:

- Implement a comprehensive Bring Your Own Device (BYOD) policy that clearly defines acceptable use and security requirements.

- Ensure all devices have updated antivirus software and secure connections, like VPNs, when accessing company data.

- Regularly conduct security training sessions to keep everyone aware of potential risks and best practices.

What strategies do you think are most effective for securing data on personal devices?

Add your perspective
Help others by sharing more (125 characters min.)
28 answers
  • Contributor profile photo
    Contributor profile photo
    Nikhil Suman

    Segment Head - Data & Analytics, Energy & Resources, UK & Europe

    • Report contribution

    Organizations should enforce implementation of MDM (Mobile Device Management) for data security. This will ensure organization security policies to be applied for organizational apps and data while allowing full freedom to use personal mobile device freely

    Like
    14
  • Contributor profile photo
    Contributor profile photo
    Darshan G A.

    Governance, Risk and Compliance | ISO 27001:2022 LA | CC by ISC2

    • Report contribution

    MDM solutions will play a key role in providing remote wipe facility, some may even provide disc encryption. Remote wipe will be necessary as the device will be handling organizational data through logins to various applications and might even store data. Email admin suite will play a key role in remotely blocking mail IDs active on lost devices - this will apply to both organizational device and BYOD. As far as access control is concerned, the BYOD policy in conjunction with the Access control policy must clearly define what at the classified levels of data that can be stored, accessed and processed through personal devices. Yet again, based on information access restriction levels, USB blocking must be explored.

    Like
    5
  • Contributor profile photo
    Contributor profile photo
    Afser Ali

    Solutions Architect at Larsen & Toubro , Cyber Security, GEN-AI/ML #L&TCognitiveServices #lntcs

    • Report contribution

    To ensure data security with personal device use, we implement Mobile Device Management (MDM) to enforce encryption and app controls. VPN access is required for secure connections, and Multi-Factor Authentication (MFA) adds a layer of protection against unauthorized access. Data is encrypted on all devices, with access controlled by role-based permissions. Endpoint security software is mandatory, and regular security training is provided to help users identify threats. We also use Data Loss Prevention (DLP) tools to monitor sensitive data and conduct periodic audits to maintain compliance with security standards.

    Like
    5
  • Contributor profile photo
    Contributor profile photo
    Heidi J Meyers

    Immigration, Federal Litigation and Economic Sanctions Attorney at Law Office of Heidi J Meyers

    • Report contribution

    Employees should be prohibited from using their own devices for company business/information/correspondence. Allowing BYOD is a recipe for loss of confidentiality and data leaks. Employees should use only company computers and devices while working, and must not download or copy information onto their personal devices.

    Like
    4
  • Contributor profile photo
    Contributor profile photo
    Fitrat Mohammad Abdullah

    IT Engineer at IHI-SMCC JV

    • Report contribution

    Besides enforcing user devices to use updated antivirus software and VPN, the restriction of using USB can be implemented by DLP software. Proxy can also be used to control internet access.

    Like
    2
View more answers
Information Systems Information Systems

Information Systems

+ Follow

Rate this article

We created this article with the help of AI. What do you think of it?
It’s great It’s not so great

Thanks for your feedback

Your feedback is private. Like or react to bring the conversation to your network.

Tell us more

Report this article

More articles on Information Systems

No more previous content
  • Your team lacks technical expertise in IT decisions. How can you empower them to contribute effectively?

    43 contributions

  • Balancing IT and finance priorities in system integration: Are you prepared to bridge the gap?

  • Your organization is facing decision-making challenges due to data quality issues. How will you address this?

  • Your IT teams are clashing over differing priorities. How do you resolve their conflicts?

No more next content
See all

More relevant reading

  • Operating Systems
    Your Operating System is lagging and you don't know why. How can you troubleshoot the issue?
  • Operating Systems
    How do you update device drivers without compromising system stability and security?
  • Information Technology
    How can you optimize Snort IDS performance in high-traffic environments?
  • Information Technology
    How can you extend the lifespan of your computer through proper maintenance?

Explore Other Skills

  • Programming
  • Web Development
  • Agile Methodologies
  • Machine Learning
  • Software Development
  • Data Engineering
  • Data Analytics
  • Data Science
  • Artificial Intelligence (AI)
  • Cloud Computing

Are you sure you want to delete your contribution?

Are you sure you want to delete your reply?

  • LinkedIn © 2025
  • About
  • Accessibility
  • User Agreement
  • Privacy Policy
  • Your California Privacy Choices
  • Cookie Policy
  • Copyright Policy
  • Brand Policy
  • Guest Controls
  • Community Guidelines
Like
5
28 Contributions