BYODilemma: How to protect company data once it walks out the door (via CIODive)
October 14, 2015
I’ve long been an advocate for companies to implement Bring Your Own Device (BYOD) initiatives. Maybe I’m naive, but I feel that users are more likely to take care of their devices and the information stored on them when they own the device. That being said, there are clearly risks and controls that need to be considered by IT leadership when implementing a BYOD initiative (particularly for mobile devices). This article from CIODive.com provides a summary of some good recommendations, including:
- Requiring anti-malware software be installed
- Encrypt communications through VPN tunnels
- Implement clear and concise policies related to the use and installation of third party applications
Does your company have a BYOD program? Is it limited to mobile devices or are laptops/desktops included? Has your IT department enacted some of these recommendations?