Skip to main content

10 steps for writing a secure BYOD policy

posted onOctober 24, 2012
by l33tdawg

Bring Your Own Device, or BYOD, is a topic that is not going away – smartphones and tablets are being adopted at such a high rate that companies are almost compelled to support them. When a CEO, managing partner, or principal of a firm wants to use his or her device, IT sometimes has no choice but to support it and find ways to secure it.

BYOD is a net positive for organizations as it promotes more responsiveness, more accessibility for workers, and higher worker satisfaction with being able to work on their schedule. However, IT staff responsible for corporate security now have a new and complex challenge to solve – supporting employees who bring their own devices into the corporate fold while maintaining the security and confidentiality of sensitive company data. CIOs know that it’s not just a technical issue but that BYOD may also require corporate policy changes and additional education for end users.

Corporate security policies vary by industry vertical as well as within specific verticals. The nature of electronic data that a company may gather, process, and disseminate can vary greatly. The increasing scrutiny required today, the demand for more privacy, and regulatory requirements, are forcing companies to create more stringent policies.

Source

Tags

Security

You May Also Like

Recent News

Friday, November 29th

Tuesday, November 19th

Friday, November 8th

Friday, November 1st

Tuesday, July 9th

Wednesday, July 3rd

Friday, June 28th

Thursday, June 27th

Thursday, June 13th

Wednesday, June 12th

Tuesday, June 11th

Simplenews subscription

Stay informed - subscribe to our newsletter.
The subscriber's email address.
Keeping Knowledge Free for Over a Decade

Copyright © 2018 Hack In The Box. All rights reserved.

36th Floor, Menara Maxis, Kuala Lumpur City Centre 50088 Kuala Lumpur Malaysia
Tel: +603-2615-7299 Fax: +603-2615-0088