BYOD: 10 Tips Enterprises Can Use to Protect Their Data

Sept. 14, 2012

Bring your own device (BYOD) has become a huge trend at the workplace, especially when corporations want to take advantage of the increases in work productivity this brings. Workers that use their own mobile devices at work - to do work - tend to be a lot more efficient. This technology leap and flexibility also makes the workplace a lot more attractive to work in.

Bring your own device (BYOD) has become a huge trend at the workplace, especially when corporations want to take advantage of the increases in work productivity this brings. Workers that use their own mobile devices at work - to do work - tend to be a lot more efficient. This technology leap and flexibility also makes the workplace a lot more attractive to work in.

Vertic, a digital ad agency, estimated that enterprise tablet adoption is growing by almost 50 percent per year. However, less than 10 percent of organizations are aware of the devices accessing their network. This presents a security and data loss risk for corporations that need to protect information on mobile devices such as smartphone and tablets.

What corporations need to do is adopt a security strategy that allows BYOD at the workplace that provides workers the device freedom and flexibility they demand and expect of the organization, while still protecting sensitive corporate information.

Matthew Dornquast, CEO and co-founder of Minneapolis-based Code 42 Software, has gathered a list of the top 10 ways companies can protect corporate information and support the BYOD growing trend.

  1. From the Start: Don't Fight It
  2. Conduct a Corporate Device Audit
  3. Conduct a Consumer Device Gap Analysis
  4. Develop and Formalize a BYOD Program
  5. Develop/Enhance Your Disaster Recovery Strategy
  6. Provide the Productivity Tools Your Employees Need
  7. Encourage Frequent Backups of Mobile Devices
  8. Develop a Formal Process to Deal with Terminated Employees
  9. Review Policy Compliance Regularly
  10. Review the BYOD Program Frequently

Read the article "IT Security & Network Security News & Reviews: BYOD: 10 Tips Enterprises Can Use to Protect Their Data" by eWeek.com to learn more about these 10 tips.

Sponsored Recommendations

Measurement instrumentation for improving hydrogen storage and transport

Hydrogen provides a decarbonization opportunity. Learn more about maximizing the potential of hydrogen.

Get Hands-On Training in Emerson's Interactive Plant Environment

Enhance the training experience and increase retention by training hands-on in Emerson's Interactive Plant Environment. Build skills here so you have them where and when it matters...

Learn About: Micro Motion™ 4700 Config I/O Coriolis Transmitter

An Advanced Transmitter that Expands Connectivity

Learn about: Micro Motion G-Series Coriolis Flow and Density Meters

The Micro Motion G-Series is designed to help you access the benefits of Coriolis technology even when available space is limited.