Free tools and resources for Data Protection Officers!

Tag Archives for " BYOD "

85% of companies allow employees to access data from personal devices creating security risks

A recent report from security firm Bitglass surveyed IT experts, and found that 85% of organizations enable BYOD policies, citing employee mobility (74%) and employee satisfaction (54%) as the top two reasons for allowing employees, contractors, and other related parties to bring their own devices. However, the convenience of BYOD creates a particularly large attack surface for malicious actors to harvest information from these organizations.

Source: 85% of enterprises allow employees to access data from personal devices, security risks abound – TechRepublic

BYOD: Time to Fall Out of Love With It 

We spend a lot of time trying to disabuse businesses of the notion that Bring Your Own Device (BYOD) is a good idea. They tend to think it will save them money, but they can’t seem to grasp the total cost of ownership. So we were pleased to see an article in The Register by Dave Cartwright, a veteran administrator of BYOD management, stating that he has fallen out of love with BYOD.

Source: BYOD: Time to Fall Out of Love With It – Here’s Why

The next big personal data attack waiting to happen…

With data security of all organisations under significant threat from external actors, all organisations need to review the security of processing personal data as a matter of urgency. And such reviews must include the use of Bring Your Own Devices (BYOD) as well as the Internet of Things (IoT) used in the workplace.

Source: The next big personal data attack waiting to happen… | Ardi Kolah LL.M | Pulse | LinkedIn

On Balancing Insider-Threat Protection and Employee Privacy

Insider attacks is serious threat to business. They are hard to detect and stop with traditional preventative controls. Cloud computing and BYOD makes it even harder. However, practices engaged in by business to secure their data and prevent data breaches may come in conflict with employees right to privacy.

Source: On Balancing Insider-Threat Protection and Employee Privacy

>