BYOD: 10 Tips Enterprises Can Use to Protect Their Data

Sept. 14, 2012

Bring your own device (BYOD) has become a huge trend at the workplace, especially when corporations want to take advantage of the increases in work productivity this brings. Workers that use their own mobile devices at work - to do work - tend to be a lot more efficient. This technology leap and flexibility also makes the workplace a lot more attractive to work in.

Bring your own device (BYOD) has become a huge trend at the workplace, especially when corporations want to take advantage of the increases in work productivity this brings. Workers that use their own mobile devices at work - to do work - tend to be a lot more efficient. This technology leap and flexibility also makes the workplace a lot more attractive to work in.

Vertic, a digital ad agency, estimated that enterprise tablet adoption is growing by almost 50 percent per year. However, less than 10 percent of organizations are aware of the devices accessing their network. This presents a security and data loss risk for corporations that need to protect information on mobile devices such as smartphone and tablets.

What corporations need to do is adopt a security strategy that allows BYOD at the workplace that provides workers the device freedom and flexibility they demand and expect of the organization, while still protecting sensitive corporate information.

Matthew Dornquast, CEO and co-founder of Minneapolis-based Code 42 Software, has gathered a list of the top 10 ways companies can protect corporate information and support the BYOD growing trend.

  1. From the Start: Don't Fight It
  2. Conduct a Corporate Device Audit
  3. Conduct a Consumer Device Gap Analysis
  4. Develop and Formalize a BYOD Program
  5. Develop/Enhance Your Disaster Recovery Strategy
  6. Provide the Productivity Tools Your Employees Need
  7. Encourage Frequent Backups of Mobile Devices
  8. Develop a Formal Process to Deal with Terminated Employees
  9. Review Policy Compliance Regularly
  10. Review the BYOD Program Frequently

Read the article "IT Security & Network Security News & Reviews: BYOD: 10 Tips Enterprises Can Use to Protect Their Data" by eWeek.com to learn more about these 10 tips.

Sponsored Recommendations

Make Effortless HMI and PLC Modifications from Anywhere

The tiny EZminiWiFi is a godsend for the plant maintenance engineers who need to make a minor modification to the HMI program or, for that matter, the PLC program. It's very easy...

The Benefits of Using American-Made Automation Products

Discover the benefits of American-made automation products, including stable pricing, faster delivery, and innovative features tailored to real-world applications. With superior...

50 Years of Automation Innovation and What to Expect Next

Over the past 50 years, the automation technology landscape has changed dramatically, but many of the underlying industry needs remain unchanged. To learn more about what’s changed...

Manufacturing Marvels Highlights Why EZAutomation Is a Force to Be Reckoned With

Watch EZAutomation's recent feature on the popular FOX Network series "Manufacturing Marvels" and discover what makes them a force to be reckoned with in industrial automation...