Open door for malwareor intentional attacks) to loss, theft of equipment or termination of an employee's contract. The IT partment should be prepar to react in each of the indicat situations. The most important th in this case is secur access to data from the application level - by assign access to specific resources only to a select group of users, implement a VPN (it will not always be possible), virtualiz sktops or monitor user activity.
Consumerization and what next? Consumerization can br many benefits to the employer, provid that the rules for the use of private vices in the company are clearly fin. This issue should USA WhatsApp Number List not be unrestimat, especially since the forecasts indicate an upward trend. The Cisco IBSG Horizons Study , conduct in the first half of , show that % of companies accept employees us their own equipment at work, and % of companies around the world anticipate an increase in.
The number of employee-own vices that will be connect to the corporate network. Therefore, there is noth else but to introduce company regulations in this regard today, before the problem of data security meets us personally. Read more about BYOD here . Categories Knowlge base Business case studies e-commerce Infographic market news Customer service.