Staying Secure in the Bring-Your-Own-Device World

Nowadays, professionals in every line of business are using their personal devices—laptops, smartphones, tablets—for work.

The phenomenon is often called “Bring Your Own Device (BYOD).” As one might imagine, having devices that are owned and maintained by employees connecting to your network raises all kinds of security concerns, especially since these devices tend to go home with the employees at the end of the day. What if an employee loses his or her tablet, which might contain confidential files? What if a laptop is stolen? Would a thief then have a direct, secure connection to your corporate server? For an extreme example, read about how a purloined USB drive brought down a nation’s government.

BYOD offers many benefits to business owners, not the least of which is the money saved through employees purchasing their own devices. Additionally, employees often feel more productive when using devices with which they’re well acquainted. The portability of such devices also brings with it the advantages of mobile computing. Combined with cloud computing technology and virtual private networking, BYOD has the potential to allow employees to work anywhere, anytime, so long as they have an Internet connection.

Just as businesses need an “acceptable use” policy that lays out the dos and don’ts of using computers owned by the company, businesses need a well-developed policy for BYOD (more than just requiring that devices are password-protected).

For an in-depth review of what your company’s BYOD policy should contain, contact CMIT Solutions. We’ll help you implement a policy that will keep you and your employees productive and secure.

Back to Blog

Share:

Related Posts

15 Quick Keyboard Shortcuts to Supercharge Your Use of Microsoft Office

In late 2013 and early 2014, CMIT Solutions covered 10 tricks, tips,…

Read More

Personal Data at Risk if You Don’t Wipe Your Old Mobile Device

Over the last 12 months, the four largest mobile carriers in the…

Read More

Who Can You Trust with Your Information? Recent Poll Says Not Many Institutions

No technology trend has been more ubiquitous lately than online security (or…

Read More