Home Applications When BYOD goes wrong

When BYOD goes wrong

0
0

I have had a tremendous reaction to my previous blog posts on BYOD.  In the first I looked at the basics of putting a BYOD policy together for your network, and my last blog post looked at remote access technologies in a BYOD era. A common question that I have been asked is what happens when BYOD goes wrong? It is inevitable that mobile devices will be lost, and in some cases they may fall into the wrong hands. When this happens you need to ask three questions.

  • Can the device be locked down remotely?
  • Do you have the tools and data available to identify what may have been on the device?
  • Do you have an incident response plan?

If a device is stolen by someone who knows what they are doing, they will get access to the data on it unless you are somehow able to wipe it first. Previously, I have recommended that you provide portal access to applications and systems which avoid the need to store sensitive data on mobile devices. However, by definition there is no secure remote access solution that prevents sensitive data from leaving your network.

To learn more and to read the entire article at its source, please refer to the following page, When BYOD goes wrong- Computerworld Blogs

     

 

More Resources:

tags:
Categories:
DABCC DABCC.com, the world leader in sharing the finest Virtualization & Cloud news and support resources. #Citrix, #VMware, #Microsoft, #Mobility and much more! Brought to you by @douglasabrown & team!
| LATEST RESOURCES

White Papers

    VMware Virtual SAN 6.2 – Virtual SAN Management API Cookbook for Python

    Typically, Virtual SAN management is performed through the vSphere® Web Client. Tasks can include those such as initial configuration, ongoing maintenance, and reporting of capacity, performance, or health of Virtual SAN. The Web Client provides comprehensive element management of each component of a Virtual SAN cluster. While most element management is easily accomplished with the Web Client user […]

    Downloads

      Download FSLogix Office 365 Container

      Enable Successful Office 365 Deployments in all Virtualized Environments For enterprise class performance expected by your end-user community, Cached Exchange Mode (CEM) must be enabled in Outlook. Once CEM is enabled, very large files (OSTs) will need to be persisted between virtual workspace sessions. Doing this with traditional approaches like roaming profiles or Folder Redirection […]

      On-Demand Webinars

        The Secrets You Need to Know About Windows 10 in VDI Environments – On-Demand Webinar

        Watch the webinar replay to hear Citrix Technical Professional (CTP), Jim Moyle, and VMware Certified Design Expert (Double VCDX) Hugo Phan delve into the impact of Windows 10 in VDI environments. Whilst Windows 10 migrations is one of the key IT initiatives driving VDI adoption today, Windows 10 and IOPS continue to be the most challenging, […]


        Close