{"id":297,"date":"2012-08-24T16:03:23","date_gmt":"2012-08-24T16:03:23","guid":{"rendered":"https:\/\/blogs.poly.com\/?p=297"},"modified":"2012-08-24T16:03:23","modified_gmt":"2012-08-24T16:03:23","slug":"enjoy-the-small-business-rewards-of-byod-by-eliminating-the-risks","status":"publish","type":"post","link":"https:\/\/blogs.poly.com\/enjoy-the-small-business-rewards-of-byod-by-eliminating-the-risks\/","title":{"rendered":"Enjoy the small business rewards of BYOD by eliminating the risks"},"content":{"rendered":"
The case for Bring Your Own Device (BYOD) is compelling, especially for small business owners. Let\u2019s start with cost savings. BYOD saves you the expense of having to keep up with mobile technology, which continues to evolve. Your employees also are happier and more productive because they have the flexibility to use the mobile devices they want to work from anywhere – even to remotely conduct a video or web conference on a smartphone or tablet using a headset<\/a>.<\/p>\n Key findings of the survey indicated:<\/p>\n Whether you currently enable BYOD or are planning to; have a policy in place to safeguard your company.\u00a0 As I\u2019ve written before in \u201cIs Your Company Prepared for BYOD<\/a>,\u201d your policy should spell out what is and isn\u2019t acceptable regarding the use of personal mobile devices. Your policy on passwords should include a set timeframe for routinely resetting them.<\/p>\n Here are a few other recommendations to protect your company data as you implement BYOD. In \u201cHow to Let Employees BYOD Without the Risk<\/a>,\u201d Chris Petersen, CTO for LogRhythm<\/a>, suggests having a separate network designed solely for mobile devices to protect your network from getting infiltrated with malware or from sensitive data falling into the wrong hands.<\/p>\n Petersen also emphasizes the need to have encryption installed on devices and for your company to be able to remotely wipe and erase data if the smartphone, tablet or laptop gets lost. Also employees should sign a policy on how they plan to secure their devices and agree to let your company know within an hour if one is lost or stolen.<\/p>\n BYOD can be a real boon to your business. Have all the right security policies and procedures in place to make sure it is.<\/p>\n Do you have a BYOD policy? What does it include?<\/p>\n <\/p>\n","protected":false},"excerpt":{"rendered":" The case for Bring Your Own Device (BYOD) is compelling, […]<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":[],"categories":[510],"tags":[442,695,696,641,637],"_links":{"self":[{"href":"https:\/\/blogs.poly.com\/wp-json\/wp\/v2\/posts\/297"}],"collection":[{"href":"https:\/\/blogs.poly.com\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/blogs.poly.com\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/blogs.poly.com\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/blogs.poly.com\/wp-json\/wp\/v2\/comments?post=297"}],"version-history":[{"count":0,"href":"https:\/\/blogs.poly.com\/wp-json\/wp\/v2\/posts\/297\/revisions"}],"wp:attachment":[{"href":"https:\/\/blogs.poly.com\/wp-json\/wp\/v2\/media?parent=297"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/blogs.poly.com\/wp-json\/wp\/v2\/categories?post=297"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/blogs.poly.com\/wp-json\/wp\/v2\/tags?post=297"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}<\/a>Still as companies move to adopt BYOD, many are not addressing cyber security and data loss, both real threats.\u00a0 Coalfire, an IT governance, risk and compliance services company, conducted a BYOD survey <\/a>last month. The responses of 400 individuals across a variety of industries, none in IT, indicate that many companies do not have a policy for mobile device use and setting passwords. \u00a0 Moreover, 49 percent of respondents said that their IT departments have not even discussed mobile\/cyber security with them.<\/p>\n
\n
\n
\n
\n
\n