The BYOD predicament

By Chris Day, Solution Consultant, Data#3

[Reading time: 1 min]

BYODPersonal computing devices are increasingly being used to conduct business activities. With smartphone saturation expected to hit 100% by 2018, we can expect to see rapid growth in this trend.

A recent article in ITProPortal highlights the growing problem arising from this trend. Smartphones are unsecured devices, so they pose a real security risk to organisations. Mobile devices can be stolen, or worse, exposed to malware or cyberattacks.

Many organisations are trying to protect themselves by implementing Bring Your Own Device (BYOD) or Wear Your Own Device (WYOD) policies. However, setting a policy is not enough – the organisation must be able to enforce the policy or they might as well have no policy at all. This very much applies to environments where BYOD is limited, or non-existant. Regardless of what the policy is, something must be in place to enforce it. This is critical to any security strategy.

There are good insights in this article for IT leaders and Technology executives on how to secure smart devices, including access protocols, policy enforcement, and addressing the human element. Let me know what you think.

See how the Data#3 and Cisco partnership is enabling digital business. Visit data3.com.au/cisco.

Tags: Bring Your Own Device (BYOD), Cisco, Security



JuiceIT Guest Blog | How XDR can help when time is of the essence

The only thing worse than cyber threats is an inability to detect those threats in time. Organisations need the…

JuiceIT Guest Blog | Veeam Platform: Reliable and Fast Recovery from Ransomware in a Hybrid World.

Ransomware attacks have become a growing concern for organisations of all sizes in Australia and New Zealand, resulting in significant…

Customer Story: Pernod Ricard Winemakers

Azure Migration gives Pernod Ricard Greater Flexibility and Improved Performance Download Customer Story Contact a Specialist…

Why would you deploy SASE?
If Secure Access Software Edge (SASE) with Cisco Meraki is the destination, what does the journey to get there look like?

Firstly, let’s set the scene. The term SASE was first mentioned by Gartner Analysts in July 2019 and Gartner continues…

Data#3 named (HPE) Platinum Partner of the Year and Aruba GreenLake Partner of the Year
Data#3 enjoys double scoops at HPE/Aruba awards night

December 08, 2022; Brisbane, Australia: Leading Australian technology services and solutions provider, Data#3, is proud to announce that it has…

Azure BaaS
Protecting Data in a Cloud World: Will Backup as a Service be what Keeps Your Business Online Through a Crisis?

Very few organisations could run in a technology-free environment, so naturally, strong IT departments put considerable effort into business continuity…

Azure Site Recovery
Beyond Backup: The Role of Azure Site Recovery in Business Continuity

In the first of our Azure Backup blog series, we discussed the value of data, and the critical importance…

Delivering the Digital Future, Securely – for Western Australia
Delivering the Digital Future, Securely – for Western Australia

Data#3, proudly sponsored by Cisco, Microsoft and Palo Alto Networks, are pleased to present to you: Delivering the Digital Future,…