Bring Your Own Device, Not Your Security Threats

As with all technologies, the biggest security threat emerges from end users’ device management habits. The best security ever devised can fall apart if a user writes their ID and password on the side of a two-factor key and then drops it in the hall. Security can also fall apart if end users visit malicious websites. Sure these threat conditions have existed since the first days of the Internet, but Bring Your Own Device (BYOD) has focused security attention on devices once again.

Read more

What Your IT Guy Wishes You Knew About BYOD

BYOD. Yes, it sounds like something that should be included on a party invitation. But to your IT team, BYOD is anything but a tasty beverage because it requests people to Bring Your Own Device. According to a Gartner study, 38 percent of companies expect to stop providing devices to workers by 2016. This means the purchasing decision will potentially be in your hands.

Read more

Three Real Costs of Bring Your Own Device (BYOD)

Many organizations are supporting the consumerization of IT by requiring or allowing personal computing devices as work productivity tools. A one-step removed view of the practice makes this seems like a quick win for everyone. The employee uses the device he or she prefers and the organization transfers device support to the employee. However, a closer look reveals unanticipated costs on both sides of the arrangement.

Read more