Home Applications When BYOD goes wrong

When BYOD goes wrong

0
0

I have had a tremendous reaction to my previous blog posts on BYOD.  In the first I looked at the basics of putting a BYOD policy together for your network, and my last blog post looked at remote access technologies in a BYOD era. A common question that I have been asked is what happens when BYOD goes wrong? It is inevitable that mobile devices will be lost, and in some cases they may fall into the wrong hands. When this happens you need to ask three questions.

  • Can the device be locked down remotely?
  • Do you have the tools and data available to identify what may have been on the device?
  • Do you have an incident response plan?

If a device is stolen by someone who knows what they are doing, they will get access to the data on it unless you are somehow able to wipe it first. Previously, I have recommended that you provide portal access to applications and systems which avoid the need to store sensitive data on mobile devices. However, by definition there is no secure remote access solution that prevents sensitive data from leaving your network.

To learn more and to read the entire article at its source, please refer to the following page, When BYOD goes wrong- Computerworld Blogs

     

More Resources:

tags:
DABCC DABCC.com, the world leader in sharing the finest Virtualization & Cloud news and support resources. #Citrix, #VMware, #Microsoft, #Mobility and much more! Brought to you by @douglasabrown & team!
| LATEST RESOURCES

White Papers

    steadyPRINT Data Sheet – centralized printer administration, monitoring and reliability!

    All In One Tool. Organize all tasks of your printer management centrally – intuitively and clearly structured: Management of the printer connections, driverless printing, monitoring & reporting of the complete print environment, print server reliability and migration and many more. Off er your users different options to simply and flexibly print their documents in each […]

    Downloads

      Download Universal Desktop Converter 3 (UDC3) – Turn PC in to Securely Managed End-Point

      The Universal Desktop Converter 3 (UDC3) thin client software provides a highly effective alternative to traditional thin client hardware. Download Universal Desktop Converter 3 (UDC3) The software is installed as the operating system on PCs, notebooks and selected thin clients, and turns the hardware into a powerful software based and universally deployable thin client allowing […]

      On-Demand Webinars

        Monitor Managing the End User Experience with GPU-Powered Insights – Citrix Ready On-Demand Webinar

        An On-Demand Citrix-Ready Webinar GPU technology improves Citrix virtual desktops and applications, but to truly deliver an immersive user experience that scales, organizations need to manage the complete GPU deployment lifecycle – from designing the infrastructure, to managing and optimizing a production environment, to responding to user issues dynamically, in real-time. eG Innovations in partnership with […]

        Latest Videos

          Turbonomic Feature Video #10 – The Green Circle IT Community

          The Turbonomic Platform can do a whole lot and we decided it would be good to walk you through our customers top 10 favorite features within the platform Feature #10 is our AWESOME community of IT thought leaders, technology evangelists, and experts. Access the community for support, questions, how-to’s and much more right from our […]

          Views All IT News on DABCC.com
          Views All IT Videos on DABCC.com
          Close