Menu
INSIGHT: How to minimise the security risks of BYOD

INSIGHT: How to minimise the security risks of BYOD

“Every single mobile device represents an endpoint where data could be lost, stolen, or compromised."

Bring your own device (BYOD) is now a permanent feature of the IT landscape. This means that mobile devices have become the next target for criminals looking to access information and networks illegally.

To avoid becoming a victim and potentially compromising vital business information, organisations should implement a BYOD strategies that prevent unauthorised access to information.

The need to control IT budgets, ensure productivity and support flexible working hours drives BYOD, with staff bringing in their own smartphones, tablets, and even PCs for business use.

However, IT teams without a consistent security and backup policy are likely to face mounting concerns as multiple BYOD devices are linked to corporate networks and employees are increasingly access data from any place, over any device.

“Every single mobile device represents an endpoint where data could be lost, stolen, or compromised,” says Lincoln Goldsmith, general manager A/NZ, Acronis.

In fact, Gartner predicts that 38 per cent of companies will rely exclusively on BYOD policies by 2016, with 85 percent of businesses expected to use some form of BYOD program by 2020, and that data breaches will shift to tablets and smartphones by 2017.

According to Goldsmith, these trends illustrate the growing importance of BYOD security.

“An effective data protection strategy should incorporate a solution that lets IT departments monitor and correct BYOD security situations and disasters remotely, while preventing unauthorised individuals from gaining access to confidential company information,” he adds.

“A reliable data protection solution for BYOD environments should also prevent employees from accidentally sharing information with others by implementing permissions and sharing restrictions.

“At all times, you should be able to tell who accessed what information and when.”

Goldsmith says a BYOD policy can benefit businesses by reducing costs on hardware and improving productivity.

For employees, it can lead to better data protection and often improve ease of use for applications. However, a consistent BYOD data protection policy should strike a sound balance between access and restriction for both employees and employers.


Follow Us

Join the newsletter!

Error: Please check your email address.

Tags BYODAcronismobilitysecurity

Featured

Slideshows

Meet the top performing HP partners in NZ

Meet the top performing HP partners in NZ

HP honoured leading partners across the channel at the Partner Awards 2017 in New Zealand, recognising excellence across the entire print and personal systems portfolio.

Meet the top performing HP partners in NZ
Tech industry comes together as Lexel celebrates turning 30

Tech industry comes together as Lexel celebrates turning 30

Leading figures within the technology industry across New Zealand came together to celebrate 30 years of success for Lexel Systems, at a milestone birthday occasion at St Matthews in the City.​

Tech industry comes together as Lexel celebrates turning 30
HP re-imagines education through Auckland event launch

HP re-imagines education through Auckland event launch

HP New Zealand held an inaugural Evolve Education event at Aotea Centre in Auckland, welcoming over 70 principals, teachers and education experts to explore ways of shaping and enhancing learning using technology.

HP re-imagines education through Auckland event launch
Show Comments