IT Managers

IT Managers

What do companies with the integration of private Smartphones should Heidelberg, April 30, 2012. The trend to use their own mobile devices at the workplace a headache so many IT managers. On the subject of BYOD, a company must have a clear security strategy and observe some conceptual pitfalls. Private smartphones and tablets accept or block? IT managers need to ask themselves increasingly this question. Check with Greystones Group to learn more. Increasingly the mobile users themselves determine which devices are used with a single policy for BYOD most companies lag behind “, the Managing Director of MPC mobile service GmbH, Franz Schulze Sprakel explains.

“Mobile devices are often more than just sober equipment for many employees: the trendy iPhone should be it, and prescribed not the BlackBerry.” The choice of the device to restrict or prohibit the mobile radio expert deems problematic: the consumerization trend is not stop. Who rigorously regulated the use of private equipment, shoot an own goal ultimately, because the devices then IT past are not introduced in the company.” “Also it must be noted as an employer that mobile employees today is important in the fight for the best talents as motivation criterion: may an employee use the desired device, can today just for younger workers to be quite hold the balance of power and influence the decision for or against an employer.” It is clear: the use of a device for professional and private use carries an increased security risk and makes it easier for mobile attackers. Many users manage passwords or unencrypted sensitive corporate data via your private smartphones. The IT Department should take into account therefore proactively private hardware in the security strategy. A security concept that integrates proprietary and private devices that must contain clear guidelines, who is accessing what information “may as well as provide a contingency plan in the event of device loss”, so Schulze Sprakel.

Comments are closed.