Subscribe / Unsubscribe Enewsletters | Login | Register

Pencil Banner

BLOG: Six tips for BYOD Security from IBM

Alan Shimel | Jan. 17, 2014
Big, small or in between, everyone can use these.

5. Undertake a functional exercise - War games, if you will. Play out the scenarios of what you have. What would happen if something happened? Have plans in place for likely scenarios. You can't plan for everything, but the more you can plan for, the better off you are. 

6. Be prepared for devices that will inevitably get lost - This is part of the planning for likely scenarios. Mobile devices getting lost are part of our lives. There should be a clear-cut process for what to do when, not if, a device is lost. Things like shutting down access from that device, wiping the device of any corporate data, etc.

BYOD is here to stay. You can just try to ignore it or you can be proactive. IBM has some good advice here that can help you get your head around BYOD. Whether you take it or utilize your own strategy, the important thing is do something.

Source: Network World


Previous Page  1  2 

Sign up for Computerworld eNewsletters.