Home / Archives For BYOD

BYOD

Avoid A Fashion Faux Pas, Prepare For Wearable Technology In The Workplace

With London Fashion Week just around the corner, pundits are already predicting that, this year, wearable technology will hit the catwalk in a big way. However, from way-out couture technology to the imminent launch of the Apple Watch, any wearable technology that connects to a corporate network can cause security and infrastructure issues and needs to be planned for. Corporately owned wearable technology and personal devices are both on the increase in the workplace. Wearables have unique advantages that businesses can and will take advantage of. For example, they might not be your typical catwalk models, but mobile warehouse workers can use wearables as mobility and tracking devices; staff in a shop can check shelves quickly; technicians can use smart glasses to look at a set of schemati......

Porn Embarrassment Is A Ticking Time Bomb For Businesses

Many companies are introducing BYOD (Bring Your Own Device) schemes to their working practices. Despite the numerous benefits this offers, many businesses are still not equipped with the necessary protection to implement these schemes correctly. Understandably, businesses want to give staff access to devices which can improve productivity and mobility, but they need to ensure these are equipped and updated with the latest technology to secure networks from increasingly complex threats. According to a recent survey of 2,000 UK workers, 21 per cent had accessed pornography and/or adult websites on a personal device which was also used for work. Alarmingly, 25 per cent claimed they were unaware visiting such websites could lead to their device being infected by malicious viruses or bugs that ......

BYOD Risks: What Are The Advantages And Disadvantages?

In the recent years BYOD (Bring Your Own Device) has become increasingly popular for employees to use at work. It has been estimated, by a report from Gartner, that by 2017, at least half of employers will require BYOD. Gartner’s report also stated that governments and organisations, of all sizes, are beginning to use BYOD, although it is more common in midsized and larger companies. What Are The Benefits Of BYOD? The main benefit, of allowing employees to bring in their own devices, is that businesses will be saving on average £150,265 every 5 years, its no surprise that businesses are beginning to embrace this idea since information security is such a growing issue. Some employees also like using their own devices, as they know how to use them. Companies will find it impossible to stop t......

Is The Mobile Device The New Company Car?

I have been in the market long enough to have lived the glorious years when as a salesperson, you would join a new company primarily because of the salary and benefits it offered above any other consideration. At that time, one of the important benefits was the company car, and once you had it, the next question was; how flexible will the company be around its use? I remember a time when you could only have a company car during office hours, then, businesses began to understand that allowing salespeople cars for personal use was in fact a real advantage for the company. They could attract and retain better people versus their competition. For us in sales it made sense, because we wouldn’t have to deal with two cars at home – one for work and one for the school run. The next logical s......

2015: The Year Of BYOA

Sometimes, it seems IT departments exist primarily to keep the lights on – monitor and maintain systems, protect against data breaches and attacks, and repair or replace computers. And, far too often the customer is not center stage. With the advent of third-party cloud services and modern new technologies, IT has begun to break the shackles of mundane maintenance and monitoring, and CIOs are seeing new opportunities to take a strategic role in the business. In 2015, we’ll see this shift blossom and grow in the everyday lives of enterprises. This will be the year CIOs make dramatic strides, including truly servicing the customer and leveraging cloud-based applications, scalable cloud-based resources and hybrid premise and cloud application development in a meaningful way. Four exampl......

5 Ways Your Employees Are Your Biggest Security Risk, And How To Stop It

Monitoring an IT network should be an essential part of any routine business process, yet so many companies fail to make sure they do this properly. These days many businesses are struggling to balance internal security and giving their employees the tools and network access needed to get their jobs done properly. It is important to ensure there are measures in place to protect against loss, misuse and data alteration. The risks of not monitoring a network are numerous. Failure to do so can correctly can lead to serious IT stability problems, as well as performance and reliability issues. A recent Forrester report showed network security is so important that businesses spent over a fifth of their total security budget on it last year. And, in Opsview’s Network Technologies and Budgets surv......

2015: The Tech Behind IoT Takes Centre Stage

The Internet of Things (IoT) is expected to generate revenue exceeding $300 billion, but whilst there has been much conversation around the devices and apps, there is little clarity on how businesses will monetise IoT or how they will manage and secure those applications, devices and data. Here are my predictions for 2015, which focus on the upcoming challenges of “BYOIoT” in the work place, securing the connected vehicle and the opportunities for everything from healthcare to the supply chain. B2B In The Cloud: 1980 Was A Long Time Ago Data sharing is a vital cornerstone of every enterprise, but in 2014 we are still relying on technology that was developed in the 80s: Electronic Data Interchange (EDI). Although EDI has proven itself to be a reliable method of exchanging data o......

Cloud Resources: The Scary Truth About Portable Enterprise Data

I don’t want to scare you, but are you using the cloud to share information and resources among employees? Are they accessing that data on personal devices? Can you control that data wherever it goes? No? It’s time to take control of your cloud resources through security protocols that will allow you to keep ownership of data; ensuring employees don’t walk off with it or lose it. Recent research says that 82 per cent of companies allow BYOD devices, with many of them encouraging or even demanding the practice. Yet 40 per cent of companies admit they do a poor job of managing identities and access to cloud information. That’s a scary situation to be in for a company – sharing your data while being powerless to protect it. Risks vs Rewards Companies implement BYOD policies because they save ......

Major Trends That Will Make 2015 ‘Year Of The Customer’

I believe that the trends we’ll see emerging in 2015 will be driven largely by the enormous changes that have occurred in the relationship between customer and organisation over the past few years. The impact of these changes on businesses will become un-ignorable in 2015, making it the year of the customer. Consumers will continue to gain power, while companies that haven’t caught on yet will need to adapt their processes and underlying infrastructure quick sharp. I foresee these major trends that will enable this ‘year of the customer’: 1. Generations Y&Z Make Video Imperative As consumers have become accustomed to communicating via video, businesses have increasingly been offering video chat to their customers. In 2015, the growing spending power of Millennials will continue to fuel......

Tackling The Content Chaos

It’s now a well-known fact that Employees are taking IT decision making into their own hands. The rate at which employees are using their own personal content collaboration tools is on the rise in 70 percent of global businesses, a figure which will grow as our lives become more interconnected through technology. As the level of content people interact with on a daily basis continues to increase, employees will seek methods to simplify their working lives – whether this is sending company content to a personal email account or moving it to a consumer cloud storage repository before downloading it to mobile devices. Popular file-sync and share solutions may well provide employees with immediate productivity relief, but the multitude of applications employees use can simply lead to further i......

5 Things Apps Taught The Enterprise In 2014

It’s funny to think that seven years ago the first iPhone was introduced and apps were just starting to make their way into our lives. Now, both Apple and Android users can choose from over 1 million apps in their respective virtual stores, and the numbers continue to climb. App fever doesn’t appear to be fading anytime soon. It’s seems only natural, then, that this proliferation of apps would eventually make its way into business and make our work lives easier, on top of our personal lives. As an employee, it would be great to access and share files, collaborate with coworkers and have more tools at your fingertips that make your job more efficient. Although adoption in enterprise has been much slower than the consumer market, apps are building a strong foundation in the market and 2014 w......

24-Hour Connected People: Keeping Your Workforce Up And Running

Despite its progress over the last 23 years, the promise of seamless Wi-Fi connectivity has not quite been delivered. As the number of connected devices proliferate, the large number of simultaneous connections running from multiple servers has caused the network to reach breaking point. It just can’t cope yet the expectation for Wi-Fi to work, and for the IT department to fix any issues, has heightened user frustration. The problem is, many are underestimating what Wi-Fi is used for in the workplace. Multiple simultaneous connections running from numerous servers continue to cause a strain on the wireless network and added to this is the number of applications being used at work. Workers are also not just connecting their corporate-provided computers, but a large number of personal device......