: Trying to access array offset on value of type bool in on line
Get to grips with cloud security to manage BYOD rise

Get to grips with cloud security to manage BYOD rise

Índice de contenidos

One of the key trends that’s set to be seen in a growing number of businesses this year is bring your own device (BYOD), as more and more companies recognise the benefits of allowing employees to use personally-owned gadgets for work.

When combined with cloud-based IT services, the benefits of this technology are obvious. As workers are able to connect with crucial resources via mobile web browsers or specialist applications, they can perform tasks on the move and keep in touch with the office wherever they are, ensuring they always have the latest data right at their fingertips.

And by allowing personal gadgets rather than company-issued handsets, this will not only be cheaper for businesses as they do not have to invest in as much hardware, but it can also keep staff happy as they get to use a single device they are already familiar with for both personal and business use.

But despite the benefits, there are a few issues that companies need to be aware of when adopting BYOD. Among the most important of these is security, which is something many firms are not currently prepared for.

A study conducted by Frost & Sullivan on behalf of (ISC)2 revealed security professionals are worried about the impact BYOD may have on their firms. 78 per cent agreed the solution increases their company’s level of risk, while almost three-quarters said new security skills are going to be required to manage this.

Michael Suby, stratecast vice-president of research at Frost & Sullivan, said this isn’t an area businesses can afford to ignore, as tablets and smartphones are going to make their way into workplaces whether employees have approval or not.

«Furthermore, the escalating capabilities of these devices, such as dual-core processors and multi-gigabytes of storage, add to the level of risk these devices pose to corporate assets and sensitive information,» he said. However, Mr Suby added: «The positive news is that information security professionals are using a growing array of security technologies to stem this risk.»

Therefore, if you’re looking to adopt BYOD to make the best use of your cloud-based IT services, you need to investigate what solutions are available to make sure you can manage this simply and keep your sensitive information safe.

How are you looking to manage the shift to BYOD? Leave a comment or join the discussion on our Google+ page.

Artículos relacionados