IT Security Can Look Like a Hero If It Leads the Charge to Establish Enterprise BYOD Policies
IT Connection Blog by Paula MusichSummary Bullets: · IT security groups should be proactive in establishing policies that govern the use of employee smartphones and tablets in the enterprise to improve their reputation as productivity enablers, rather than stumbling blocks. · Key considerations include what devices to allow, how corporate data and apps will be accessed, where data will reside, and what the users’ risk profiles are. Some recent surveys suggest that while many enterprises are now allowing employees to use their own devices to access corporate networks and