By Chris Day, Solution Consultant, Data#3
[Reading time: 1 min]
Personal computing devices are increasingly being used to conduct business activities. With smartphone saturation expected to hit 100% by 2018, we can expect to see rapid growth in this trend.
A recent article in ITProPortal highlights the growing problem arising from this trend. Smartphones are unsecured devices, so they pose a real security risk to organisations. Mobile devices can be stolen, or worse, exposed to malware or cyberattacks.
Many organisations are trying to protect themselves by implementing Bring Your Own Device (BYOD) or Wear Your Own Device (WYOD) policies. However, setting a policy is not enough – the organisation must be able to enforce the policy or they might as well have no policy at all. This very much applies to environments where BYOD is limited, or non-existant. Regardless of what the policy is, something must be in place to enforce it. This is critical to any security strategy.
There are good insights in this article for IT leaders and Technology executives on how to secure smart devices, including access protocols, policy enforcement, and addressing the human element. Let me know what you think.
See how the Data#3 and Cisco partnership is enabling digital business. Visit data3.com.au/cisco.