리스크가 따르는 사업: 7이제 그만해야 하는 BYOD 습관
You might like it, hate it, or have no idea what to think about it, but BYOD is here, and it's here to stay. You can't change that. But you can make it safer, more practical, and more useful to the organization by stopping these bad BYOD habits now.
1. Not Having a Solid BYOD Policy (or Not Reviewing It Often Enough)
|Make it clear what users are and are not allowed to do with devices that hold sensitive company information. Also, make it clear what will happen if they don't comply.|
2. Not Using Data Encryption
It's surprising how many of the recent data breaches involving high-profile organizations (including numerous government agencies where IT professionals should know better) have involved poor encryption or a complete lack of encryption. High-level encryption is essential today, especially in a BYOD environment.
3. Not Having Strict Authentication Requirements
What requirements do you have regarding multifactor authentication? If you don't require multifactor authentication, at least define and require strong password criteria for worker-owned devices. Just be sure that the various devices on the network are capable of any requirements you put in place regarding special characters.
4. Not Specifying Which Apps are Approved
|Which apps can be used for work-related tasks? Which should not be allowed on the devices at all?|
5. Not Specifying Which Cloud Storage Solutions are Approved
There are numerous cloud storage platforms for mobile devices, such as Google Docs, Apple iCloud, Microsoft OneDrive, etc. Which will you allow? Which does IT deem unsafe? Be sure to specify what is and isn't an acceptable cloud storage platform for work related documents, images, etc.
6. Allowing IT to Collect Personal Data from Employee Devices
A sound BYOD policy has to go two ways. While it does protect the company (particularly the network and systems) from the users, it also needs to provide the user with privacy and protection, as much of the data, apps, etc. are owned by them. Make sure IT workers can't collect what they shouldn't be. Allow the user their own privacy regarding family photos, personal contacts, private emails, etc.
7. Not Giving IT the Tech to Wipe Devices
Unfortunately, sometimes a user and/or a device goes missing. Phones get lost and stolen, and workers quit or just don't come back one day. IT needs a way to wipe the device of all work-related data so that the company is protected no matter what happens to the user and their device.
Learn more about BYOD and how it can work better in your business by visiting NETSCOUT for more information and resources today.
Have the Cloud and Mobile Got Your Enterprise Out of Control? Grab It Back
데이터 센터의 미래
BYOD: 내부? 외부? 경계상에? BYOD의 미래에 대한 진정한 정보
마지막으로 스토리지 인프라 구축?
클라우드에서의 용량 관리: 처리해야 할 과소평가된 문제
NETSCOUT의 Chris Partsenidis와의 전문가 인터뷰
'기업 분할'이란 무엇이며 그에 대해 무엇을 알아야 할까요?
다음으로 IT 네트워킹 담당자들은 어떤 교육을 필요로 할까요?
클라우드 어플리케이션을 사용할 때 최종 사용자 경험을 개선하는 방법
네트워크 가상화의 이점은 무엇입니까?
성능 향상이 파열적 혁신으로 악화되는 때는 언제인가?
BYOD 정책의 초안 작성 시 고려해야 할 중요 사항들
사물 인터넷에서 소프트웨어 정의 네트워킹의 중요 역할
국경 없는 기업의 어두운 면: 네트워크 성능에 대한 영향