Menu
INSIGHT: How to minimise the security risks of BYOD

INSIGHT: How to minimise the security risks of BYOD

“Every single mobile device represents an endpoint where data could be lost, stolen, or compromised."

Bring your own device (BYOD) is now a permanent feature of the IT landscape. This means that mobile devices have become the next target for criminals looking to access information and networks illegally.

To avoid becoming a victim and potentially compromising vital business information, organisations should implement a BYOD strategies that prevent unauthorised access to information.

The need to control IT budgets, ensure productivity and support flexible working hours drives BYOD, with staff bringing in their own smartphones, tablets, and even PCs for business use.

However, IT teams without a consistent security and backup policy are likely to face mounting concerns as multiple BYOD devices are linked to corporate networks and employees are increasingly access data from any place, over any device.

“Every single mobile device represents an endpoint where data could be lost, stolen, or compromised,” says Lincoln Goldsmith, general manager A/NZ, Acronis.

In fact, Gartner predicts that 38 per cent of companies will rely exclusively on BYOD policies by 2016, with 85 percent of businesses expected to use some form of BYOD program by 2020, and that data breaches will shift to tablets and smartphones by 2017.

According to Goldsmith, these trends illustrate the growing importance of BYOD security.

“An effective data protection strategy should incorporate a solution that lets IT departments monitor and correct BYOD security situations and disasters remotely, while preventing unauthorised individuals from gaining access to confidential company information,” he adds.

“A reliable data protection solution for BYOD environments should also prevent employees from accidentally sharing information with others by implementing permissions and sharing restrictions.

“At all times, you should be able to tell who accessed what information and when.”

Goldsmith says a BYOD policy can benefit businesses by reducing costs on hardware and improving productivity.

For employees, it can lead to better data protection and often improve ease of use for applications. However, a consistent BYOD data protection policy should strike a sound balance between access and restriction for both employees and employers.


Follow Us

Join the New Zealand Reseller News newsletter!

Error: Please check your email address.

Tags BYODAcronismobilitysecurity

Featured

Slideshows

Tight lines as Hooked on Lenovo catches up at Great Barrier Island

Tight lines as Hooked on Lenovo catches up at Great Barrier Island

​Ingram Micro’s Hooked on Lenovo incentive programme recently rewarded 28 of New Zealand's top performing resellers with a full-on fishing trip at Great Barrier Island for the third year​ in a row.

Tight lines as Hooked on Lenovo catches up at Great Barrier Island
Inside the AWS Summit in Sydney

Inside the AWS Summit in Sydney

As the dust settles on the 2017 AWS Summit in Sydney, ARN looks back an action packed two-day event, covering global keynote presentations, 80 breakout sessions on the latest technology solutions, and channel focused tracks involving local cloud stories and insights.

Inside the AWS Summit in Sydney
Channel tees off on the North Shore as Ingram Micro hosts annual Cure Kids Charity golf day

Channel tees off on the North Shore as Ingram Micro hosts annual Cure Kids Charity golf day

Ingram Micro hosted its third annual Cure Kids Charity Golf Tournament at the North Shore Golf Club in Auckland. In total, 131 resellers, vendors and Ingram Micro suppliers enjoyed a round of golf consisting of challenges on each of the 18 sponsored holes, with Team Philips taking out the top honours.

Channel tees off on the North Shore as Ingram Micro hosts annual Cure Kids Charity golf day
Show Comments