Articles about BYOD

Five best practices for securing mobile devices and everything they touch

mobile security

In the span of just one year from 2012 to 2013, smartphone thefts in the U.S. nearly doubled to 3.1 million, and another 1.4 million were lost, according to Consumer Reports. For businesses and other organizations, every one of those losses and thefts could enable multiple security breaches. That’s because confidential data stored on the phone isn’t the only asset that’s vulnerable. As a trusted device, that phone also has access to corporate networks and the data stored on them.

More than half of North American and European companies are developing a bring-your-own-device (BYOD) policy, Forrester Research says. These policies implicate security risks because, for example, employees are reluctant to give their IT departments the power to remotely erase their smartphone or tablet when it’s lost, stolen, or the employee separates from the company. Part of employees’ fear is that the device will be wiped by mistake, costing them irreplaceable personal data such as photos.

Continue reading

The future for enterprise mobility [Q&A]


The shift towards mobile computing and BYOD has been the big story in enterprise IT over the past couple of years.

But has the trend towards mobile peaked? Can we expect BYOD to move into smaller organizations and what effect will legal and regulatory frameworks have? We spoke to Gary Greenbaum, CEO of BYOD billing specialist Syntonic to find out.

Continue reading

How to protect your network in the BYOD era

laptop tablet smartphone

The consumerization of business technology is picking-up speed. This trend towards the introduction of consumer technology within the corporate environment for the use of work activities is best reflected in policies like Bring Your Own Device (BYOD).

These policies have become prevalent in most corporate environments, and have kept many network administrators awake at night worried about the potential data breaches that could occur.

Continue reading

FireLayers and Check Point bring security to enterprise cloud apps

laptop shield defense

As more employees use their personal devices for business, corporate data is increasingly put at risk from sophisticated malware.

To foil these attacks, real-time protection company FireLayers and security specialist Check Point Software Technologies today announced their joint Extend Perimeter Security solution, which spreads security to cloud applications and provides enterprises with protection from zero-day threats and malware distribution.

Continue reading

Travel tips for mobile employees

man beach summer

Long days, warm weather, the lure of travel, if only to a nearby park or beach -- many employees, naturally, are thinking of escaping the office for time away.

For the past year, since the passage of home working legislation in the UK, employees who have been on the job at least 26 weeks have had the right to request flexible working hours.

Continue reading

Summing up BYOD advantages, disadvantages and alternatives

business mobile

Bring your own device, or BYOD, is certainly something that businesses can no longer afford to ignore. By 2017, Gartner predicts that half of all employers will require staff to provide their own work devices.

But before organizations ultimately decide to embrace or reject BYOD, they must be aware of the advantages and disadvantages at the heart of this mobile dilemma.

Continue reading

Syntonic launches BYOD billing management for smaller businesses

Tablet BYOD building

The rise of BYOD offers businesses improved flexibility and employee productivity, but those things come at a price. BYOD can lead to extra costs such as needing to reimburse staff for air time.

Mobile platform provider Syntonic is launching DataFlex, an operator-independent split billing solution designed to cost-effectively deploy, operate, and manage BYOD usage for businesses of any size.

Continue reading

Bring Your Own Device and Windows 10


Over the last decade and particularly in the tablet age, business and academic organizations have slowly transitioned to a Bring Your Own Device (BYOD) model, where employees/students buy their own IT and then link it to the network. This has never been a security friendly way of doing things but the cost benefits have usually won the day. With Windows 10, this may well change

We have all been reading the stories about the new End User License Agreement (EULA) in W10 that gives Microsoft the right to view huge reams of your personal information, including information in private folders. This may be a non-event for some home users but in an age of BYOD, where company and academic data may be copied or synchronized onto private IT, it should be seriously considered as a business threat. I have no doubt that Enterprise licenses will be locked down fairly tight but a BYOD is not an Enterprise license.

Continue reading

In BYOD companies trust -- or should they?


Running a business in today’s digitally-driven world means that most, if not all, of your employees will be using their own personal mobile devices to send and receive work emails, logging into the company’s intranet, posting messages on the corporate Yammer account, sending instant messages to one another and sharing files between computers and the cloud. This BYOD tendency is just a part of corporate life today and there’s no point in trying to fight it.

But just as there are pluses to having a BYOD workforce, there are also minuses. On the one hand, your employees are more productive and efficient -- they can stay on top of urgent business matters without having to physically be in the office. But on the other side of the coin are some serious risks that are often exacerbated by the fact that businesses just don’t know enough about mobile security, lack comprehensive BYOD security policies and aren’t always as diligent about monitoring employee use of devices inside and outside of work.

Continue reading

A VMI strategy is the optimum solution for BYOD adopters

business mobile

In the BYOD era, enterprises are searching for the optimum mobile work environment -- one that will strike the right balance between security and user needs.

The enterprise’s goal is to achieve the highest level of security. Employees, on the other hand, want the simple, fun user experience they get as consumers. A Virtual Mobile Infrastructure (VMI) strategy can be the ideal solution.

Continue reading

How personal devices are changing the American workplace


We're all familiar with the idea of BYOD and allowing employees to use their own devices for work. But how much impact is it having out in the real world workplace?

Workspace as a service provider Workspot has produced an infographic based on a survey of 500 US workers sheds some interesting light on things. High numbers of Americans are using their own devices for work, with 64 percent admitting that they sometimes do so. Those that do use their own devices do so for between 10 and 30 percent of the work day.

Continue reading

UK businesses risk data loss with BYOD policies


By allowing you to bring your own, unprotected mobile devices to work (BYOD), UK businesses risk losing data, a new research report suggests.

Forty percent of UK businesses have no security or policies in place to prevent unauthorised employees from accessing what they shouldn't, the research by Arlington Research and Acronis found.

Continue reading

Xirrus simplifies Wi-Fi access for BYOD


According to Gartner 85 percent of enterprises expect to have policies for allowing employee-owned devices in the workplace by 2020. This gives administrators a growing challenge in securing, supporting and managing them.

High-performance wireless specialist Xirrus is launching a new service suite called EasyPass, designed to manage mobile device connections to Wi-Fi networks in the simplest way and with minimal IT involvement.

Continue reading

How a growing cyber attack industry is good news for investors

cyber security

Whilst cyber attacks continue to make the news, a new report published by Capital News Desk suggests that around 70 percent of organizations choose to keep their security incidents quiet.

It also reveals that around 73 percent of large organizations have been infiltrated by attacks. It's newer technologies like BYOD and the cloud that are seen as the biggest threats along with cyber crime.

Continue reading

The main obstacles to BYOD mass adoption

Businessman tablet reading coffee desk table touch

After nearly two decades of having smartphones and other devices that are exclusively for work purposes, there has been little headway in making Bring Your Own Device, or BYOD, a standard practice in the work place. In fact, it is nearly unheard of as a standard accepted business practice.

What exactly is preventing this convenient solution from becoming the norm? Here are a few of the major reasons why BYOD has yet to take off.

Continue reading

© 1998-2015 BetaNews, Inc. All Rights Reserved. Privacy Policy.