Comprehensive policies should address corporate devices, guest devices, trusted or known IoT devices, and untrusted or unknown devices. Security and business leaders should define these policies based on best practice frameworks, taking into account the organization’s risk tolerance.
Many businesses are still relying on “hunches” about risk, often with qualitative rankings such as “high, medium, or low.” Leadership should develop a quantitative risk model, which can allow for better security initiative planning, prioritization, and budgeting. Only with a regular dynamic view into risk can a company confidently say that it is providing the necessary level of security.
For end-user devices, a mix of corporate-issued devices and BYOD can allow organizations to focus on security for users accessing sensitive information, offer choices to those who will benefit most from it, and save money with users that only require basic applications. Organizations should also implement an Enterprise Mobility Management (EMM) or Mobile Device Management (MDM) platform to serve as their primary defense against security threats arising from mobilization.