Five Tips to Brave the BYOD Boom - Slide 5

Email     |     Share  
1 | 2 | 3 | 4 | 5 | 6 | 7
Next Five Tips to Brave the BYOD Boom-5 Next

...that flash drives will be lost and IT will never know. Losing a $10 flash drive can be even worse than losing a laptop.  Stolen or lost laptops are reported, $10 flash drives are quietly replaced.  Use encrypted flash drives or don't use them at all, right now only 35 percent of companies enforce data encryption on company issued devices.

When it comes to IT security it’s frightening how the glaringly obvious for some, are shocking moments of truth for others. The most recent Harris Interactive poll about data security in the workplace is proof that bad things can happen even when you’re sure you’ve thought of everything.
 
Kevin Vlasich, cryptography and information security specialist at Imation, shares his five tips for IT professionals facing the latest threat to identity and intellectual property the BYOD boom.

More Slideshows:


Battle of the Enterprise-Ready Mobile OS The platforms were each scored on a combination of factors including built-in security, application security, authentication, device wipe, device firewall, virtualization and many others.

Five Web Application Security Myths Many companies fail to make the first step towards security because of misconceptions and security myths.

Five Keys to Creating the Data Center of Tomorrow Five strategic IT moves that will help CIOs push their data center forward.

 

Related Topics : A Big Market for Big Data Jobs, Midmarket CIO, IT Management Automation, SharePoint, Technology Markets

 
More Slideshows

Fake news How Can We Fix the Fake News Problem?

Is fake news a security issue? Some say yes, as it can be used as a social engineering tool to spread disinformation and conceivably to get unsuspecting users to click on malicious links. ...  More >>

IT security skills 7 Top Skills for Security Pros

Executives at several top tech firms outline the skills they need now and in the near future, including IaaS and IoT security expertise. Other skills listed may surprise you. ...  More >>

142x105itbeusasecurity2.jpg 9 Predictions for Cybersecurity’s Role in Government and Politics in 2017

Experts predict how cybersecurity will affect and involve our government, policies and politics in 2017. ...  More >>

Subscribe to our Newsletters

Sign up now and get the best business technology insights direct to your inbox.