Security: BYOD Security: 8 Steps Enterprises Can Take to Limit Risks to Company Data

By Jeffrey Burt  |  Posted 2012-08-06 Print this article Print
Passwords or PINs

Passwords or PINs

Smartphones and tablets come with the security option of requiring users to enter passwords or PINs before being able to use the device. This is particularly important in case the device is stolen or lost. Enterprises should enforce a policy of using passwords or PINs, according to Bit9.
Enterprises, after some initial resistance, are embracing the bring-your-own-device (BYOD) trend. According to a survey released in May by Cisco Systems, 95 percent of respondents said their organizations allow employee-owned devices in the workplace, and that 76 percent said BYOD was positive for their companies and challenging for their IT departments. The benefits are clear: Employees who are allowed to use their favorite smartphones and tablets for work are more satisfied and more productive. It also can save businesses some money by not having to buy corporate-issued devices. However, enterprises are still struggling with addressing the challenges in the areas of management and security. Officials at security software company Bit9 say that a key loose end in BYOD environments is employees, many of whom don't think about security on a daily basis or take the needed precautions to protect themselves or their company. Bit9 officials stress the need for good security policies to help avoid pitfalls, and have outlined eight technologies already on the market for mobile devices that should be enforced by the company to protect against mobile malware and other risks.

Submit a Comment

Loading Comments...
Manage your Newsletters: Login   Register My Newsletters

Rocket Fuel