CYOD, Choose Your Own Device

CYOD, or Choose Your Own Device, is a policy or approach where organizations provide employees with a pre-approved selection of devices from which they can choose for work-related tasks. Unlike BYOD (Bring Your Own Device), where employees use their personal devices, CYOD allows employees to select a device from a limited set of options provided by the organization. This approach aims to strike a balance between employee preference and organizational control over device management and security.

Examples of CYOD:

  1. Laptop Selection: An organization may offer employees a range of laptop options to choose from, each meeting the organization’s security requirements and productivity needs. Employees can select a device based on their preferences, such as screen size, performance, or operating system.
  2. Tablet Options: Organizations may provide employees with a list of approved tablets that meet their security and compatibility standards. Employees can then select a tablet that suits their work requirements.
  3. Smartphone Choices: Organizations might offer a set of approved smartphones for employees to choose from. These devices would typically have the necessary security features and compatibility with corporate applications.

Possible Security Issues with CYOD:

  1. Device Compatibility: Supporting multiple device models and platforms can introduce complexities in terms of device management, compatibility with corporate infrastructure, and application support.
  2. Data Leakage and Loss: The use of organization-approved devices does not eliminate the risk of data leakage or loss. Employees may still inadvertently expose sensitive information through improper data handling or by using unauthorized applications or services.
  3. Lost or Stolen Devices: Devices chosen by employees are still susceptible to loss or theft. Organizations need to have measures in place to handle such incidents, including remote wipe capabilities or data encryption to protect corporate information.
  4. Application Security: While devices are pre-approved, the security of the applications installed on those devices is equally important. Organizations should enforce application whitelisting, regular updates, and security assessments to mitigate the risk of malicious or vulnerable applications.
  5. User Behavior: Even with approved devices, employee actions can impact security. Organizations need to provide ongoing training and awareness programs to educate employees about best practices, such as strong password management, avoiding suspicious links, and safe use of company resources.

Mitigation Solutions for CYOD Security:

  1. Device Standardization: Offer a limited range of pre-approved devices that meet security requirements and are manageable from an IT perspective. Standardizing devices reduces complexity and allows for easier device management, patching, and security monitoring.
  2. Mobile Device Management (MDM): Implement an MDM solution to manage and secure devices, enforce security policies, and enable remote management capabilities. MDM allows IT departments to remotely wipe devices, enforce encryption, and apply security patches.
  3. Data Encryption: Implement device-level or file-level encryption to protect sensitive data in case of device loss or theft. This ensures that even if a device falls into the wrong hands, the data remains inaccessible.
  4. Strong Authentication: Enforce strong authentication measures, such as passwords, PINs, or biometric authentication, to prevent unauthorized access to devices and corporate resources.
  5. Application Management: Implement an application management solution that allows IT departments to whitelist approved applications, restrict installation of unauthorized apps, and enforce regular updates for security patches.
  6. Regular Patching and Updates: Ensure devices are regularly updated with the latest security patches and firmware updates to address vulnerabilities and protect against emerging threats.
  7. Employee Training and Awareness: Provide ongoing training programs and awareness campaigns to educate employees about security best practices, data handling guidelines, and the importance of adhering to organizational policies.
  8. Incident Response: Establish an incident response plan to handle device loss or theft, including procedures for remote wipe, reporting incidents, and recovering data from backups.

By implementing appropriate security measures and providing employees with a curated selection of devices, organizations can mitigate security risks associated with CYOD. It allows employees to choose devices that suit their preferences while maintaining control over device management and security.

Author: tonyhughes