Page 48 - Payout Magazine Online Volume 9.6
P. 48

Managing           Back in 2009, Intel realized that
BYOD Risk in              implementing a BYOD policy was the
a Connected        best way to mitigate the risks of unauthorized
Workplace          devices accessing company IT resources,
                   instead of banning the devices outright. IT
48 PayOutMagazine  managers realized that employees would
                   bring the devices in any way, with Intel having
                   little say in how the devices connected with
                   the IT infrastructure.

                        A BYOD policy creates accountability for
                   employees who are made to understand the
                   risks associated with using their devices. It
                   also affords the IT department some control
                   over how the technology interacts with
                   corporate IT.

                   The Benefits of BYOD

                        However much a company resists the use
                   of personal devices for work-related tasks,
                   there are significant advantages in allowing
                   workers to use technology with which they
                   are familiar.

                        Companies are always looking for more
                   ways to encourage productivity. A BYOD
                   policy, when implemented responsibly, can
                   impact a worker’s productivity in positive
                   ways and create a competitive advantage.

                        We will continue this discussion on the
                   leading security challenges associated with
                   BYOD and strategies which can reduce the
                   risks.

                   Considering the Issues

                        A BYOD policy is not a one-size-fits-all
                   solution. Risk assessments will need to be
                   performed so companies can settle on an
                   appropriate security formula.

                        The growing functionality of smart
                   devices will play a key role in determining the
                   security protocols which are initiated now
                   and in the future. For instance, devices which
                   will be used for processing credit cards will
                   need to have PCI-DSS compliance on every
                   device. Naturally, the processing of such
                   delicate information will mean these devices
   43   44   45   46   47   48   49   50   51   52   53