Hoboken, New Jersey - (Vocus Public Relations) August 28, 2012 – A new computer network security threat is popping up as a result of employees and visitors using their own computers and smartphones in the workplace. It’s referred to as BYOD or Bring Your Own Device. eMazzanti Technologies, an IT expert in the Hoboken, NJ and New York City areas, has just released two new articles that define the scope of the threat and provide suggestions for mitigating the security concern. The full articles are free and can be found at:
https://www.emazzanti.net/byod-what-is-it/ and https://www.emazzanti.net/are-you-ready-to-byod/
BYOD: Right or Risky?
As business becomes more mobile, tablets and smartphones are taking an active role in the technology shift. BYOD (bring your own device), where employees use their personal devices to complete work tasks, is becoming common practice—sometimes sanctioned and sometimes under-the-radar. It’s inevitable that people will want to consolidate devices and make work as easy as possible, but can a tablet or smartphone really be used as your primary computing tool?
For workers who need to be on-the-go, smartphones and tablets can truly increase overall efficiency. Employee productivity increases, and so do budgets. But before a company can reap these benefits, there are some risks and considerations to recognize, especially when employees are using their own smartphones and tablets, instead of ones provided by a business’s IT team:
◦Device variety: There’s a large menu of operating systems and hardware options, which makes it difficult for IT to focus on securing a single platform.
◦Outdated firmware: Many consumers don’t generally keep current on their firmware, which disables basic operation and other functions of the device.
◦Network authentication: Lost or upgraded personal devices still carry potentially sensitive company information that you won’t want floating around.
◦Mobility issues: Tablets and smartphones are susceptible to theft or loss, and can get expensive to replace.
◦Data plan misuse: When adding tablets into budgets, data plan costs are often forgotten. Most users will go over their plan, and generally it’s from personal use (e.g., streaming movies or browsing the internet).
How to Mitigate Risks
The eMazzanti article’s main point to better BYOD-security is for the business owners to have a specific plan in place.
“Our advice to businesses is to proactively create a BYOD security plan and not wait until a data disaster happens first,” notes Jennifer Mazzanti, president, eMazzanti Technologies. “A well-qualified IT expert should be able help develop a comprehensive plan.”
Other specific suggestions can be found in the full versions of each article at:
https://www.emazzanti.net/byod-what-is-it/ and https://www.emazzanti.net/are-you-ready-to-byod/
About eMazzanti Technologies
With a company name that sounds more like a purebred, high-performance sports car than a IT support and consulting firm, eMazzanti Technologies is all about delivering powerful solutions such as managed print services, PCS DSS compliance, computer network management, network troubleshooting, business continuity and disaster recovery, green computing, mobile workforce technology, information security, cloud computing, cloud computing services, and business information optimization in the most efficient manner possible. The Hoboken, N.J., firm is located in one of the most densely populated – and competitive – regions in the U.S. It provides business technology consulting services for companies ranging from home offices to multinational corporations throughout the New York metropolitan area. For more information contact: Carl Mazzanti 201-360-4400 or emazzanti.net., Twitter: @emazzanti , Facebook: Facebook.com/emazzantitechnologies.
Microsoft Exchange provides multiple ways to control email communication in a business. Shared Mailboxes and…
Remote working was once a niche specialty, only used by tech-savvy and freelancers. But in…
While we live in a digital age, print is still a staple for many businesses.…
Increasingly, email communication is playing a pivotal role in business operations, facilitating collaboration, customer engagement,…
As the digital landscape evolves, businesses of all sizes face the challenge of managing complex…
In the evolving landscape of information technology, businesses constantly seek the most efficient and cost-effective…