A study by tyntec says that 49 percent of firms have employees that at least partially use their own devices at work, which poses huge security risks. According to James Pooley, an information security consultant and former Silicon Valley trial lawyer, it's important to know which devices might represent a risk.
"The growing popularity of BYOD policies means that many of your employees may well be storing sensitive information on the same laptops, smartphones, and tablets they use to scroll through status updates in the evenings. That's cause for concern, because cyber thieves can gain access to the content of these devices and your company's systems through relatively easy-to-hack social media accounts and apps. In addition to establishing clear policies on social media use, consider technical mitigation measures. Mobile device management (MDM) tools can remotely configure devices, monitor what's on them, and even erase their data if lost. MDM techniques can also include encryption for data stored on or communicated from the device."
Your company's data — client information, payment information, personal files, bank account details — is always at risk of falling into the wrong hands. And every day, security threats seem to come from a new place.
In this slideshow, we have collected some of the best advice that leading security experts have shared with IT Business Edge recently, identifying areas of data vulnerability and helping you develop strategies for securing your data and information systems.
When phone calls, video conference information, pictures, chat logs, etc. are all stored in a central location via social media, a potential hacker has access to just about everything, quickly and easily. ... More >>