BYOD (Bring Your
Own Device) is the allowance of employee-owned equipment onto company
systems. Typically, this involves employees using consumer computing
devices (such as iPads or Surface tablets) to get work done, either in the
office, at home, or on the road. Many of these devices are not designed to “get work done,” but instead to consume content (e.g., checking email, reading news, social media, etc.). These devices are not managed and may lack even the most basic security features enabled. Here is the problem: If your BYOD strategy is not planned correctly, this can spell disaster for any corporate network. How is your company protecting its data on
devices out of its control? What happens when an employee leaves the company or a device is accidentally left behind at a coffee shop?
Until recently when we thought of computing devices, we usually thought of PCs and laptops. Today, with tablets and smart phones selling in the millions on opening weekend, we have a very different picture of what a computing device is.
If you’re not familiar with it, BYOD (Bring Your Own Device) is the idea of using a consumer computing device (such as an iPad or Surface RT tablet) to get work done, either in the office, at home, or on the road. Most of these devices were not designed to “get work done”, but instead to consume content (ex: checking email, reading news websites/apps, etc.). These devices are not managed, and may not have even the most basic security features enabled. This can spell disaster for any corporate network. Continue reading
Few can argue that carrying a cell phone is very convenient for both us and the people trying to contact us. For many of us it is an absolute necessity to be reachable for at least part of the day regardless of whether you are in the office, home, or on the soccer field with the kids. For many years IT Pros have been forced to carry multiple devices. Some were personal devices (cell, iPod, etc…), while others were work related (work cell, PDA). Luckily, now there are some new technologies which allow us to consolidate to one or two mobile devices. Continue reading
The ability to work anywhere used to be limited to freelancers and writers, but today’s professionals need the flexibility to be productive regardless of their physical location. Microsoft Office 365 provides the full-featured suite of services that businesses need to scale quickly and focus on core growth. While Office 365 may call to mind […]
Large software and hardware manufacturers are generally a trusted source for updates, but that same level of trust with consumers is what makes these groups a heavy target for hackers. The recent infiltration of ASUS made it all too clear that no one is safe from the threat of malware attacks. The Taiwan-based tech giant recently was […]
Firewalls were developed over thirty years ago and function as the first line of defense for many business networks. This piece of network equipment is a perimeter defense that determines whether packets can move into or out of the network. While the basic concept of a firewall is simple, the way that it performs this […]
Our days are full of distractions, from phones that don’t stop ringing to apps that don’t stop dinging. Each time we pause from one task, it takes us several seconds to a few minutes to get our minds back on track. This may not seem like much of an impact, but it can really […]