Blog

We have opinions and we like to share them.

They aren’t always technology related, we like to think we have a thing or two to say about Leadership and management and hope you will find the occasional post or tweet useful.

7 musts to implement BYOD successfully

Mobility is essential for a successful company, but the challenge is securing all that data.

A mobile workforce

Today, employee mobility and office BYOD programs are critical for enterprise productivity. Mobile devices add new security challenges, bypassing many of the security controls you have in place. Mobile devices, mobile apps and the networks they use are now essential to satisfy customers, collaborate more effectively with suppliers, and keep employees productive anytime and anywhere.

Unfortunately, increased connectivity often translates to increased security threats. Gartner predicts that by 2018, 25 percent of corporate data traffic will flow directly from mobile devices to the cloud, bypassing traditional enterprise security controls. Hackers are constantly innovating to target your organization and mobile devices have become their path of least resistance. John Michelsen, chief product officer at Zimperium, shares seven musts for any BYOD program to successfully thwart mobile cyber attacks.

1. Understand mobile privacy concerns

Employees don’t expect personal privacy when operating a company-owned computer. Therefore, surveillance-style security solutions meet little resistance from users. But when employees bring their own devices to work, monitoring web searches and email content becomes a major violation of privacy. Enterprises must develop mobile security strategies meeting the staff’s privacy expectations and security requirements set by IT.

 

 

Leave a Reply

Your email address will not be published. Required fields are marked *