Subscribe / Unsubscribe Enewsletters | Login | Register

Pencil Banner

5 ways to shore up security in your BYOD strategy

David Weldon | Sept. 23, 2015
A recent study by tyntec reveals that a vast majority of organizations still have inadequate bring-your-own-device (BYOD) policies. So what does it take to get BYOD right in 2015?

Proper training is critical

Educate employees on how to connect their devices to the network and also the dos and don’ts of their usage. Lunchtime training sessions are a smart idea. Stress what it is that employees are agreeing to, including what happens if a device is lost or stolen – the wiping of the device. Most employees will say yes, and for those that don’t, they can’t participate in the program.

Finally, “BYOD risks and considerations will continue to grow and change just as rapidly as the technologies change,” stresses Vanderpool. “It is vital that all aspects of the BYOD model be continuously reviewed, updated, re-communicated and employees re-educated. The model deployed and the supporting guidelines, policies and procedures implemented to support it must be agile and allow the company to be able to quickly adapt or change them when necessary.”

 

Previous Page  1  2  3  4 

Sign up for CIO Asia eNewsletters.