SHARE
Facebook X Pinterest WhatsApp

Five Tips to Brave the BYOD Boom

When it comes to IT security — it’s frightening how the glaringly obvious for some, are shocking moments of truth for others. The most recent Harris Interactive poll about data security in the workplace is proof that bad things can happen even when you’re sure you’ve thought of everything. Kevin Vlasich, cryptography and information security specialist […]

Written By
thumbnail
ITBE Staff
ITBE Staff
Apr 24, 2012

When it comes to IT security — it’s frightening how the glaringly obvious for some, are shocking moments of truth for others. The most recent Harris Interactive poll about data security in the workplace is proof that bad things can happen even when you’re sure you’ve thought of everything.
 
Kevin Vlasich, cryptography and information security specialist at Imation, shares his five tips for IT professionals facing the latest threat to identity and intellectual property — the BYOD boom.

Five Tips to Brave the BYOD Boom - slide 1

Click through for five tips for IT professionals facing the BYOD boom, as identified by Kevin Vlasich, cryptography and information security specialist at Imation.

Five Tips to Brave the BYOD Boom - slide 2

…the worst! Don’t hire a penetration tester. Save your money and assume “they” will get in – 75 percent of organizations have suffered data loss from negligent or malicious insiders.

Five Tips to Brave the BYOD Boom - slide 3

…employees will use their personal devices on the corporate network, even if they are told not to. More than 50 percent of employees use portable devices to take confidential data out of their companies every day.

Five Tips to Brave the BYOD Boom - slide 4

…that your employees value convenience more than security.  If a security policy is overly cumbersome or inconvenient, employees will find a way around it.  Don’t underestimate the ingenuity of employees looking to circumvent procedures that slow them down.

Five Tips to Brave the BYOD Boom - slide 5

…that flash drives will be lost and IT will never know. Losing a $10 flash drive can be even worse than losing a laptop.  Stolen or lost laptops are reported, $10 flash drives are quietly replaced.  Use encrypted flash drives or don’t use them at all, right now only 35 percent of companies enforce data encryption on company issued devices.

Five Tips to Brave the BYOD Boom - slide 6

…that an organization’s first and last defense against a security breach is its own employees. Training employees on good security practices offers the most bang for the buck. Everyone should learn how to recognize phishing attacks and fake anti-virus software advertisements – if it looks too good to be true, it really is.

Identify a Phishing Message in Five Steps

Recommended for you...

Unifying Data Management with Data Fabrics
Litton Power
Jun 17, 2022
5G and Industrial Automation: Practical Use Cases
Kashyap Vyas
Apr 22, 2022
Understanding the Relationship Between 5G and Edge Computing
Collins Ayuya
Apr 19, 2022
Building a Private 5G Network for Your Business 
Kihara Kimachia
Apr 18, 2022
IT Business Edge Logo

The go-to resource for IT professionals from all corners of the tech world looking for cutting edge technology solutions that solve their unique business challenges. We aim to help these professionals grow their knowledge base and authority in their field with the top news and trends in the technology space.

Property of TechnologyAdvice. © 2025 TechnologyAdvice. All Rights Reserved

Advertiser Disclosure: Some of the products that appear on this site are from companies from which TechnologyAdvice receives compensation. This compensation may impact how and where products appear on this site including, for example, the order in which they appear. TechnologyAdvice does not include all companies or all types of products available in the marketplace.