Share

The BYOD predicament

By Chris Day, Solution Consultant, Data#3

[Reading time: 1 min]

BYODPersonal computing devices are increasingly being used to conduct business activities. With smartphone saturation expected to hit 100% by 2018, we can expect to see rapid growth in this trend.

A recent article in ITProPortal highlights the growing problem arising from this trend. Smartphones are unsecured devices, so they pose a real security risk to organisations. Mobile devices can be stolen, or worse, exposed to malware or cyberattacks.

Many organisations are trying to protect themselves by implementing Bring Your Own Device (BYOD) or Wear Your Own Device (WYOD) policies. However, setting a policy is not enough – the organisation must be able to enforce the policy or they might as well have no policy at all. This very much applies to environments where BYOD is limited, or non-existant. Regardless of what the policy is, something must be in place to enforce it. This is critical to any security strategy.

There are good insights in this article for IT leaders and Technology executives on how to secure smart devices, including access protocols, policy enforcement, and addressing the human element. Let me know what you think.

See how the Data#3 and Cisco partnership is enabling digital business. Visit data3.com.au/cisco.

Tags: Bring Your Own Device (BYOD), Security, Cisco

Featured

Subscribe to our blog

Related

2020 Global Networking Trends Report
2020 Global Networking Trends Report:
See what’s next in networking

Advances in technology and automation are changing the face of the network model. With 42% annual growth in business mobile…

10 Mythbusters for SMB Cybersecurity
Big Security in a Small Business World:
10 myth busters for SMB cybersecurity

Several myths exist around how seriously SMBs take cybersecurity. This recently released Cisco report, “Big Security in…

Customer Story: Fiji National Provident Fund

Fiji National Provident Fund Gains Visibility of Devices and Software Licenses   Objective To better manage its Microsoft licenses, the…

Video Resources
Cisco Intersight Video Resources

Managing the complexity of data centre infrastructure is an ongoing challenge for IT teams. Unfortunately, many on-premises tools fail to…

JuiceIT Digital 2020 Digest
JuiceIT Digital 2020 Digest | Edition 4

The 5 Things that Remain Unchanged for IT Leaders Post-COVID Jean-Baptiste Alphonse Karr wrote in 1849, ‘plus ça change, plus…

JuiceIT Digital 2020 Digest
JuiceIT Digital 2020 Digest | Edition 3

Out of the Shadows: Getting Clarity with Your Post-COVID IT Landscape Imagine trying to establish strong security in your home,…

JuiceIT Digital 2020 Digest
JuiceIT Digital 2020 Digest | Edition 2

Letting Go of Normal: Your Post-COVID Survival Guide Over the last few months, many homebound Australians have been taking stock.

JuiceIT Digital 2020 Digest
JuiceIT Digital 2020 Digest | Edition 1

Business as Unusual: The Organisations That Will Emerge Strongest from 2020 When the bushfires that incinerated over 10 million hectares1…