Mobility of the workforce is most affected by the BYOD policy of the organization. Banning BYOD is not the solution. BYOD usage with cloud backup must be embraced, but security of the consumer devices must be managed.
Check out if your cloud backup and recovery service provider has multiplatform management capability. There are a few questions you must ask. You must also make the effort to find the right answers from the information nuggets provided by the cloud backup service vendor’s website. Does the service really support all the different types of devices your users are likely to bring to the table? Does the vendor clearly indicate the types of device support provided with their service? Are the software agents required for integration of the different devices to the cloud backup account downloadable from the vendor site? How complex is the installation process? How bandwidth intensive is the application? Does the application agent permit centralized access and management to the administrator?
BYOD requires powerful security. The cloud backup service vendor must ensure that all data travelling from source and at rest are encrypted with impregnable cryptographic algorithms. If the algorithm is FIPS 140-2 certified, the service will be rendered more attractive. User friendly graphical user interfaces must permit the device user connect up to the cloud backup database with pre defined, policy driven, enterprise administrator controlled, authentication and authorization protocols. Only authenticated and authorized devices must have the facility of downloading and viewing encrypted enterprise data in readable formats. Similarly, authenticated and authorized users must have the facility to upload enterprise data from their device in encrypted formats to the central cloud backup account of the organization.
It must be remembered that employees do not appreciate tradeoffs on privacy. They want the best of both worlds. They want to use their own device for business purposes while maintaining unrestricted personal usage experience that is untainted by fear of privacy violations by the enterprise. The cloud backup agent installed on the device must automatically identify the workspace or database based on source. Personal data must be categorized as personal data and remain inaccessible to the remote enterprise administrator via the agent installed on the device. Third party applications downloaded by the employee for personal use or personal data should not be accessible to the agent software.
In short, work data should not leak into personal data areas and vice versa. Work areas must be clearly demarcated from personal applications and the agent software must have access only to predefined/ identified locations on the device.