Home Applications When BYOD goes wrong

When BYOD goes wrong

0
0

I have had a tremendous reaction to my previous blog posts on BYOD.  In the first I looked at the basics of putting a BYOD policy together for your network, and my last blog post looked at remote access technologies in a BYOD era. A common question that I have been asked is what happens when BYOD goes wrong? It is inevitable that mobile devices will be lost, and in some cases they may fall into the wrong hands. When this happens you need to ask three questions.

  • Can the device be locked down remotely?
  • Do you have the tools and data available to identify what may have been on the device?
  • Do you have an incident response plan?

If a device is stolen by someone who knows what they are doing, they will get access to the data on it unless you are somehow able to wipe it first. Previously, I have recommended that you provide portal access to applications and systems which avoid the need to store sensitive data on mobile devices. However, by definition there is no secure remote access solution that prevents sensitive data from leaving your network.

To learn more and to read the entire article at its source, please refer to the following page, When BYOD goes wrong- Computerworld Blogs

     

Featured Resources:

Related Articles:

tags:
Categories:
DABCC DABCC.com, the world leader in sharing the finest Virtualization & Cloud news and support resources. #Citrix, #VMware, #Microsoft, #Mobility and much more! Brought to you by @douglasabrown & team!
| LATEST RESOURCES

White Papers

    Microsoft Reference Architecture for a High Availability SharePoint Server 2016 Farm in Azure

    The Azure CAT Patterns & Practices team has published a new reference architecture for deploying and running a high availability SharePoint Server 2016 farm in Azure. It provides prescriptive guidance including the following topics: Architecture resources necessary for the deployment, including resources. Scalability considerations. Availability considerations. Manageability considerations. Security considerations. Like all reference architectures that […]

    Downloads

      FREE eG Enterprise Logon Simulator for Citrix XenApp and XenDesktop

      Fast, free and incredibly useful. Coming in summer 2017. 14Synthetic logon simulation tool for monitoring, diagnosis, alerting and reporting of Citrix logon performance Quick SaaS deployment – be up and running in minutes Web-based monitoring console Supports logon through StoreFront or NetScaler Gateway Best-suited for Citrix XenApp 6.5, 7.x and XenDesktop 7.x Free forever, no […]

      On-Demand Webinars

        Latest Videos

          Live from the #AWS NY Summit | AWS SAM Local Launch

          Live from the AWS Summit in NYC, Tara Walker and Chris Munns discuss the new launch of AWS SAM Local on twitch.tv/aws. Host: Tara Walker Guest: Chris Munns, Sr Developer Advocate for AWS Serverless Date: August 14, 2017 For more information on the AWS Twitch Channel and upcoming live coding episodes, visit https://aws.amazon.com/twitch. To learn more […]

          Views All IT News on DABCC.com
          Views All IT Videos on DABCC.com
          Win a Tesla P100D

          Visit our Sponsors!

          Close