Home Applications When BYOD goes wrong

When BYOD goes wrong

0
0

I have had a tremendous reaction to my previous blog posts on BYOD.  In the first I looked at the basics of putting a BYOD policy together for your network, and my last blog post looked at remote access technologies in a BYOD era. A common question that I have been asked is what happens when BYOD goes wrong? It is inevitable that mobile devices will be lost, and in some cases they may fall into the wrong hands. When this happens you need to ask three questions.

  • Can the device be locked down remotely?
  • Do you have the tools and data available to identify what may have been on the device?
  • Do you have an incident response plan?

If a device is stolen by someone who knows what they are doing, they will get access to the data on it unless you are somehow able to wipe it first. Previously, I have recommended that you provide portal access to applications and systems which avoid the need to store sensitive data on mobile devices. However, by definition there is no secure remote access solution that prevents sensitive data from leaving your network.

To learn more and to read the entire article at its source, please refer to the following page, When BYOD goes wrong- Computerworld Blogs

     

Featured Resources:

Related Articles:

tags:
DABCC DABCC.com, the world leader in sharing the finest Virtualization & Cloud news and support resources. #Citrix, #VMware, #Microsoft, #Mobility and much more! Brought to you by @douglasabrown & team!

Leave a Reply

| LATEST RESOURCES

White Papers

    Gartner: My “How to Hunt for Security Threats” Paper Published

    My mini-paper on threat hunting is out!Review “How to Hunt for Security Threats” (Gartner GTP access required) and provide feedback here. The abstract states “Technical professionals focused on security are starting to explore the mysterious practice of “threat hunting” to improve their security monitoring and operations. This requires uniquely skilled personnel and wide-ranging data collection […]

    Downloads

      Base Image Script Framework (BIS-F) – Version 6.0.0

      The perfect way to seal your Base Image Every time you build you’re base Image from scratch or update it, you must seal it before deploying it to your cloned devices. No matter if you are using Citrix XenApp/XenDesktop with Machine Creation Services (MCS) or Provisioning Services (PVS), VMware View or Microsoft only, BIS-F supports […]

      On-Demand Webinars

        Latest Videos

          Optimizing IT performance in the era of modern hybrid networks – On-Demand Webinar

          Hybrid networks, the answer to the cloud debate, are the network infrastructures of the future. Organizations facing challenges while migrating to these are looking for solutions. ManageEngine offers solutions for both traditional on-premises as well as public and private cloud-based services. Monitor and manage your modern hybrid network with ManageEngine’s OpManager and Site24x7. Learn more […]

          Views All IT News on DABCC.com
          Views All IT Videos on DABCC.com
          Win a Tesla P100D

          Visit our Sponsors!


          Close
          Do NOT follow this link or you will be banned from the site!