Page 48 - Payout Magazine Online Volume 9.6
P. 48
Managing Back in 2009, Intel realized that
BYOD Risk in implementing a BYOD policy was the
a Connected best way to mitigate the risks of unauthorized
Workplace devices accessing company IT resources,
instead of banning the devices outright. IT
48 PayOutMagazine managers realized that employees would
bring the devices in any way, with Intel having
little say in how the devices connected with
the IT infrastructure.
A BYOD policy creates accountability for
employees who are made to understand the
risks associated with using their devices. It
also affords the IT department some control
over how the technology interacts with
corporate IT.
The Benefits of BYOD
However much a company resists the use
of personal devices for work-related tasks,
there are significant advantages in allowing
workers to use technology with which they
are familiar.
Companies are always looking for more
ways to encourage productivity. A BYOD
policy, when implemented responsibly, can
impact a worker’s productivity in positive
ways and create a competitive advantage.
We will continue this discussion on the
leading security challenges associated with
BYOD and strategies which can reduce the
risks.
Considering the Issues
A BYOD policy is not a one-size-fits-all
solution. Risk assessments will need to be
performed so companies can settle on an
appropriate security formula.
The growing functionality of smart
devices will play a key role in determining the
security protocols which are initiated now
and in the future. For instance, devices which
will be used for processing credit cards will
need to have PCI-DSS compliance on every
device. Naturally, the processing of such
delicate information will mean these devices