Does your Organization have a BYOD Policy?

Do you use your mobile device for work? And if yes, is there a BYOD policy you’re required to follow? If not, you are not the only one. According to the study from BT, 98% of American organizations allow employees to use mobile devices for work purposes.

Yet only 33% of organizations do not have a BYOD policy today.

These are scary statistics, as there are many risks involved when using mobile devices with company information on them. These risks include devices not being secured with passwords, and lost or stolen devices. Jason Cook, vice president of security at BT in the Americas explains that “these breaches have led to financial and reputational damage, and he sees mobile devices as a natural attack vector as businesses enable more mobile access”.

These are major risks that can be easily prevented, for starters using strong passwords on devices, and better yet encrypting these devices for optimized protection.

 

Removable Media Encryption Improve Security and Flexibility

Previous Post
Risks Long After Breach
Next Post
Retailers – Why Include Encryption?

Related Posts

When virtual environments get too heavy

When Virtual Environments Get Too Heavy

As an encryption security vendor that is working its way into Mobile Device Management (MDM), I’m fascinated and constantly looking at new ways to secure mobile devices and company information. As someone with a background in virtualized environments, I’m even…
Read more

Educating with Data Security

Education institutions have numerous important and sensitive documents stored that they are responsible for. This sensitive information belongs to students, parents and faculty and comes in the form of loans, financial records, employment records, etc. (more…)
Read more

SecTor 2014 – What We Learned

Last week, thousands of IT security professionals gathered in Toronto for the annual SecTor Security Conference to share compelling research and new techniques. From malware attacks to unencrypted stolen devices, data theft is rampant in the enterprise, and security solutions…
Read more

Leave a Reply

Your email address will not be published.

Fill out this field
Fill out this field
Please enter a valid email address.

Menu
Contact Us

This will close in 15 seconds