Does your Organization have a BYOD Policy?

Do you use your mobile device for work? And if yes, is there a BYOD policy you’re required to follow? If not, you are not the only one. According to the study from BT, 98% of American organizations allow employees to use mobile devices for work purposes.

Yet only 33% of organizations do not have a BYOD policy today.

These are scary statistics, as there are many risks involved when using mobile devices with company information on them. These risks include devices not being secured with passwords, and lost or stolen devices. Jason Cook, vice president of security at BT in the Americas explains that “these breaches have led to financial and reputational damage, and he sees mobile devices as a natural attack vector as businesses enable more mobile access”.

These are major risks that can be easily prevented, for starters using strong passwords on devices, and better yet encrypting these devices for optimized protection.

 

Removable Media Encryption Improve Security and Flexibility

Previous Post
Risks Long After Breach
Next Post
Retailers – Why Include Encryption?

Related Posts

Waging the War on Passwords

We have seen large password hacks recently including: LinkedIn, eHarmony, and Yahoo. Hacks so large some in the industry call this the Password Wars. Unfortunately for the general public—we are losing. However, before the trumpets play, let’s give them a…
Read more

Nothing is ever ‘free’

Last week I attended SC Congress in New York and did a presentation talking about the results of our study with the Ponemon Institute and the cost of data encryption solutions. It was a good event, well attended and there…
Read more

Apple’s Privacy Policy

Apple’s new privacy policy allows the user to encrypt emails, contacts, and photos that uses a code that the user has created. Not even Apple will have access to this code. This gives sole power over iPhone’s personal data to…

The “Key” to Playing it Safe

Apple this week rolled out a new version of its operating system running mobile devices such as iPads and iPhones. It also announced it will no longer be able to comply with requests of law enforcement to unlock the encryption…
Read more

Leave a Reply

Your email address will not be published. Required fields are marked *

Fill out this field
Fill out this field
Please enter a valid email address.

Menu