Home Applications When BYOD goes wrong

When BYOD goes wrong

0
0

I have had a tremendous reaction to my previous blog posts on BYOD.  In the first I looked at the basics of putting a BYOD policy together for your network, and my last blog post looked at remote access technologies in a BYOD era. A common question that I have been asked is what happens when BYOD goes wrong? It is inevitable that mobile devices will be lost, and in some cases they may fall into the wrong hands. When this happens you need to ask three questions.

  • Can the device be locked down remotely?
  • Do you have the tools and data available to identify what may have been on the device?
  • Do you have an incident response plan?

If a device is stolen by someone who knows what they are doing, they will get access to the data on it unless you are somehow able to wipe it first. Previously, I have recommended that you provide portal access to applications and systems which avoid the need to store sensitive data on mobile devices. However, by definition there is no secure remote access solution that prevents sensitive data from leaving your network.

To learn more and to read the entire article at its source, please refer to the following page, When BYOD goes wrong- Computerworld Blogs

     

More Resources:

tags:
DABCC DABCC.com, the world leader in sharing the finest Virtualization & Cloud news and support resources. #Citrix, #VMware, #Microsoft, #Mobility and much more! Brought to you by @douglasabrown & team!

LEAVE YOUR COMMENT

Your email address will not be published. Required fields are marked *

| LATEST RESOURCES

White Papers

    Remote Site Print Servers: The Last Stand for Onsite Servers? – White Paper

    Practical Considerations on Consolidation of Print Servers into the Data Centre and Alternative Deployment of Effective Local Print Appliances. Over the past decade, the methods we use to deploy IT services into remote sites has dramatically and irrevocably changed. Years ago, every remote site had its very own dedicated ‘server room’ equipped with a dedicated domain controller; a […]

    Downloads

      Download FREE Access Policy Tool for Citrix XenApp and XenDesktop from Wedel IT

      This is the first of many tools we are currently developing for making the job a bit easier for all the Citrix admins out there. Some of the more advanced configurations in Citrix XenApp and XenDesktop are performed via the PowerShell command line. For some, this might seem scary, as the commands are often somewhat […]

      On-Demand Webinars

        FSLogix Apps and Office 365 Container for Citrix – On-Demand Webinar

        In this Webinar, David Young, Solutions Architect and Product Champion for FSLogix, provides an overview of FSLogix Apps and Office 365 Container for Citrix. This webinar addresses the latest enhancements surrounding Office 365 Container for Citrix including Outlook Search on XenApp. Learn about the significant reduction on network and storage overhead along with drastically enhanced application […]

        Latest Videos

          Automate Patch Management Video

          This video is from the fine folks at ManageEngine Learn more at, https://www.manageengine.com/ About ManageEngine ManageEngine delivers the real-time IT management tools that empower IT teams to meet organizational needs for real-time services and support. Worldwide, established and emerging enterprises – including more than 60 percent of the Fortune 500 – rely on ManageEngine products to ensure […]

          Views All IT News on DABCC.com
          Views All IT Videos on DABCC.com

          Visit our Sponsors


          Close