Home Applications When BYOD goes wrong

When BYOD goes wrong

0
0

I have had a tremendous reaction to my previous blog posts on BYOD.  In the first I looked at the basics of putting a BYOD policy together for your network, and my last blog post looked at remote access technologies in a BYOD era. A common question that I have been asked is what happens when BYOD goes wrong? It is inevitable that mobile devices will be lost, and in some cases they may fall into the wrong hands. When this happens you need to ask three questions.

  • Can the device be locked down remotely?
  • Do you have the tools and data available to identify what may have been on the device?
  • Do you have an incident response plan?

If a device is stolen by someone who knows what they are doing, they will get access to the data on it unless you are somehow able to wipe it first. Previously, I have recommended that you provide portal access to applications and systems which avoid the need to store sensitive data on mobile devices. However, by definition there is no secure remote access solution that prevents sensitive data from leaving your network.

To learn more and to read the entire article at its source, please refer to the following page, When BYOD goes wrong- Computerworld Blogs

     

 

More Resources:

tags:
Categories:
DABCC DABCC.com, the world leader in sharing the finest Virtualization & Cloud news and support resources. #Citrix, #VMware, #Microsoft, #Mobility and much more! Brought to you by @douglasabrown & team!
| LATEST RESOURCES

White Papers

    Optimizing Virtual Infrastructure Storage Systems with Xangati ESP

    IN SEARCH OF BETTER TOOLS FOR OPTIMIZING EXPANSIVE ENTERPRISE STORAGE Virtualized infrastructures span servers, switches, storage systems and client devices. Of these four categories, storage systems are the most challenging to correctly size, configure and operate. That’s why IT administrators who manage complex virtual and cloud environments rely on Xangati ESP. Xangati’s real-time monitoring and analysis platform […]

    Downloads

      Download AppEnsure Free Application Response Time And Throughput In Virtualized And Cloud Environments

      Download AppEnsure: Application Response Time And Throughput In Virtualized And Cloud Environments.  AppEnsure is a Citrix Startup Accelerator company! AppEnsure provides APM for IT Operations to proactively manage end-user experience. AppEnsure uniquely correlates the real end-user response time experience with the application-delivery infrastructure performance, providing contextual, actionable intelligence to reduce resolution time by 95% of […]

      On-Demand Webinars

        HPE: ShareFile in a Hybrid Office 365 Environment

        HPE’s Ciaran Rafferty, WW Mobility & Cloud File Management Architect, along with Michael Moore, WW Director, End User Workplace Services Portfolio, shared use cases on how to enable your enterprise users to move their unique and sensitive data over to the Office 365 environment. With the huge surge of Enterprise customers moving to Microsoft Office 365, fully […]

        Latest Videos

          VMware VSAN Assessment Tool – Walkthrough Video

          The video walks you through the process of starting and running a VSAN Assessment. It also highlights new features that were released on August 1st 2016: Semi-offline mode and TCO (storage efficiency) benefits. From the fine folks at VMware Storage.


          Close