Staying Secure in the Bring-Your-Own-Device World
posted on March 27, 2012
Nowadays, professionals in every line of business are using their personal devices — laptops, smartphones, tablets — for work.
The phenomenon is often called “Bring Your Own Device (BYOD).” As one might imagine, having devices that are owned and maintained by employees connecting to your network raises all kinds of security concerns, especially since these devices tend to go home with the employees at the end of the day. What if an employee loses his or her tablet, which might contain confidential files? What if a laptop is stolen? Would a thief then have a direct, secure connection to your corporate server? For an extreme example, read about how a purloined USB drive brought down a nation’s government.
BYOD offers many benefits to business owners, not the least of which is the money saved through employees purchasing their own devices. Additionally, employees often feel more productive when using devices with which they’re well acquainted. The portability of such devices also brings with it the advantages of mobile computing. Combined with cloud computing technology and virtual private networking, BYOD has the potential to allow employees to work anywhere, anytime, so long as they have an Internet connection.
Just as businesses need an “acceptable use” policy that lays out the dos and don’ts of using computers owned by the company, businesses need a well-developed policy for BYOD (more than just requiring that devices are password-protected).
For an in-depth review of what your company’s BYOD policy should contain, contact CMIT Solutions. We’ll help you implement a policy that will keep you and your employees productive and secure.
Author: Michael Hunter
Categories: Information Technology Services
Tags: BYOD, laptops, smartphones, tablets