Growing up I would always see my dad carry a briefcase to and from work. As a security precaution the briefcase needed a security code to access it. Granted, the briefcase could only hold so much. Today’s workplace culture is so different, especially with mobile technologies. With your mobile device or tablet you can practically carry around your organization’s entire file room. Because information protection is one of the Generally Accepted Recordkeeping Principles it is important that those involved with information governance are part of any Bring Your Own Device (BYOD) discussions:
Nearly half of enterprises that allow employee-owned devices to connect to a company’s network have experienced a data breach, a study has revealed.
Most of these companies reacted by restricting data access rights (45%) or installing security software (43%), according to the survey of 400 IT professionals by Decisive Analytics.
The firms followed these approaches, the survey report said, despite the fact that prevention is a better option than fire-fighting after an incident has occurred.
Only 12% of companies surveyed shut down their bring-your-own-device (BYOD) programme altogether after experiencing a breach.
This suggests that most firms recognise the benefits of BYOD can be preserved as long as proper security precautions are put into place, said Cesare Garlati, vice president of mobile security at security firm Trend Micro.
You can read more in Nearly Half of Firms Supporting BYOD Report Data Breaches in Computer Weekly.