fbpx
Share

The BYOD predicament

By Chris Day, Solution Consultant, Data#3

[Reading time: 1 min]

BYODPersonal computing devices are increasingly being used to conduct business activities. With smartphone saturation expected to hit 100% by 2018, we can expect to see rapid growth in this trend.

A recent article in ITProPortal highlights the growing problem arising from this trend. Smartphones are unsecured devices, so they pose a real security risk to organisations. Mobile devices can be stolen, or worse, exposed to malware or cyberattacks.

Many organisations are trying to protect themselves by implementing Bring Your Own Device (BYOD) or Wear Your Own Device (WYOD) policies. However, setting a policy is not enough – the organisation must be able to enforce the policy or they might as well have no policy at all. This very much applies to environments where BYOD is limited, or non-existant. Regardless of what the policy is, something must be in place to enforce it. This is critical to any security strategy.

There are good insights in this article for IT leaders and Technology executives on how to secure smart devices, including access protocols, policy enforcement, and addressing the human element. Let me know what you think.

See how the Data#3 and Cisco partnership is enabling digital business. Visit data3.com.au/cisco.

Tags: Bring Your Own Device (BYOD), Cisco, Security

Featured

Related

Azure Site Recovery
Beyond Backup: The Role of Azure Site Recovery in Business Continuity

In the first of our Azure Backup blog series, we discussed the value of data, and the critical importance…

Delivering the Digital Future, Securely – for Western Australia
Delivering the Digital Future, Securely – for Western Australia

Data#3, proudly sponsored by Cisco, Microsoft and Palo Alto Networks, are pleased to present to you: Delivering the Digital Future,…

K-12 Video Period
Securing the school network amidst escalating threats

Security threats are now a routine problem for increasingly connected education institutions. The good news is that a new generation…

Protecting Data in a Cloud World: What You Need to Know About Azure Backup

Welcome to Part 1 of our 3-part blog series, exploring data protection options and considerations for when you’re operating in…

The Southport School Revisited
The Southport School: Four Years On

How have their investments in wireless networking and security paid off after four years? Download Customer…

Palo Alto Security Growth Partner of the Year
Data#3 Triumphs with Palo Alto Networks Security Award

November 11, 2022; Sydney, Australia: Leading Australian technology services and solutions provider, Data#3, is proud to announce that it has…

Delivering-the-Digital-Future-Securely
Delivering the Digital Future, Securely

Cyber security challenges continue to evolve, compliance obligations increase and skills shortages stress your teams – what if we could…

ACSC Essential Eight Maturity Model: Regular Backups
Essential Eight Maturity Model: Regular Backups

In 2021, the Australian Cyber Security Centre (ACSC) updated the Essential Eight Strategies to Mitigate Cyber Security Incidents Maturity…