How to Turn BYOD Security Risks to Your Advantage - Slide 4

Email     |     Share  
1 | 2 | 3 | 4 | 5
Next How to Turn BYOD Security Risks to Your Advantage-4 Next

At the same time CIOs are struggling to manage the rise in BYOD, they also must consider regulatory changes that make data loss not only bad for business, but also illegal. You can’t comply with payment card industry (PCI) or Sarbanes-Oxley (SOX) standards if you don’t know whether your employees are sharing spreadsheets full of customer credit card information with outsiders or losing devices that contain unpublished financial results. The average large organization loses dozens of mobile devices every year, according to the Ponemon Institute. If those devices belong to employees, you might not have the ability (or the legal right) to wipe them clean to keep data out of the wrong hands.

Like most IT security risks, one of the greatest concerns of enterprises today can be hard to spot – at first. The small, rectangular outline in an employee’s shirt pocket. The nearly flat case slipped into a worker’s bag beside his laptop. The increasing amount of business being conducted on touchscreens. These are recognizable signs of the bring-your-own-device (BYOD) trend and the latest nightmare keeping CIOs awake at night. Which documents are being downloaded to these mobile devices? Which ones are being forwarded outside of the organization or synced to a cloud service? And how can IT ensure data protection on smartphones and tablets not managed by the organization?

CIOs need to answer these questions now, before one of the greatest advances in productivity – BYOD – becomes one of the easiest ways to lose control over your company’s intellectual property. This slideshow features steps that IT should take to prepare for BYOD, as identified by Ryan Kalember, chief product officer at WatchDox.


Related Topics : A Big Market for Big Data Jobs, Midmarket CIO, IT Management Automation, SharePoint, Technology Markets

More Slideshows

IT_Man89-290x195 9 Tips for Running a 'Tween' Company

Advice and tips for entrepreneurs and companies that are no longer startups but not quite ready for an IPO, also known as "tweens." ...  More >>

IT_Man88-190x128 Top 5 Trends Affecting Women-Owned Micro Businesses

Learn more about the challenges and opportunities presented to women leaders, especially micro-business owners. ...  More >>

Analytics21-190x128 5 Ways to Avoid Becoming 'Digital Prey'

Future IT leaders will need to seek technologies that eliminate silos in order to deliver the right information to the right person within the right application environment at the right time. ...  More >>

Subscribe to our Newsletters

Sign up now and get the best business technology insights direct to your inbox.