New iPad at work? Make sure it is secure.

New iPad at work?  Make sure it is secure. With the holiday season behind us,  as expected, many employees are coming to work with shiny new tablet computers including Android Tablets, Microsoft Windows RT Tablets and the new Apple iPad Mini.   Your company may have a “Bring Your Own Device” mobile device management policy that allows employees to use these devices at work and, in some cases, for work.  Maybe you made that year-end corporate purchase to outfit your staff with the new iPad.  Either way, you need to make sure your corporate network, applications and data stay secure as these mobile devices enter the workplace. Here are a few tips to make sure your mobile device policies are in place, so your employees can use those new iPads securely.   Review your Mobile Device Policy Does your company have a written mobile device policy?  If not, you should put that in place.  The top issues with mobile devices, such as a new iPad, are related to loss or theft.  Because these devices may have access to your corporate applications and data, including email, customer and inventory data, make sure your employees know what is acceptable use for these mobile  devices.  Is it ok to store corporate data on personal devices within your company?  Conversely, can employees store personal data on a corporate owned mobile device?  Either way, have a stated mobile device policy so you can measure compliance with your mobile device policies and procedures.   Proactively Manage Your New iPad You can secure your iPad in case of loss or theft by keeping an audit of the...

Apple to Begin Shipment of iPad Mini Tablets

Apple to Begin Shipment of iPad Mini Tablets Apple Computer announced their newest tablet computer, the Apple iPad Mini  on November 2nd. Expect the Apple iPad Mini with WiFi with Cellular LTE support to begin shipping sometime this week. The Apple iPad Mini joins a variety of choices in tablet computing including Microsoft Windows RT Tablets, Google Android Tablets and the family of Apple iPads. Tablet computers are one of the fastest growing segments of PCs, so it is no surprise there is a wide range of choices. Here are some things you should consider when purchasing a tablet computer for your business. What is the intended business use of the tablet computer? Tablets are great for taking notes during meetings, one on one sales presentations, collecting data in the field, accessing patient information in the examination room and a variety of other tasks where the user is standing or sitting without a desk. Think twice if you expect your tablet to replace a desktop or laptop computer. For example, laptops are great for working on an airplane or taking work home or on the road. Don’t make your decision for a tablet computer as an “either/or” decision. Consider the business requirements the tablet computer will fill. Do I have a policy for handling corporate data on a tablet computer? One consideration when purchasing tablet computers is that they are more vulnerable to theft and/or loss. You should take precautions to ensure you have the ability to wipe corporate data from the device if it is lost or stolen. How will your business back up data from tablets? Employees...

Beyond Bring Your Own Device

Beyond Bring Your Own Device (BYOD) Many businesses have adopted an IT policy of Bring Your Own Device (BYOD) to save money and provide employees with the flexibility of staying connected when they travel, work from home and spend time in the field.  The BYOD policy allows employees to use personal smart phones and tablets for business purposes. According to research firm Computer Economics, companies can save between $1350 and $3500 annually by adopting a BYOD policy.  In addition, employees can be more productive and have higher job satisfaction with a IT mobility plan. According to research by the Computer Technology Industry Association, CompTIA, security is the primary issue for IT Managers when it comes to mobility.  The number one risk cited is loss or theft of a mobile device.  Seventy percent of those surveyed implement mobile device password locking as part of their data protection plan for mobile devices. However, a four digit password in itself is not enough security, so there are a number of additional precautions companies should take to protect valuable corporate data. Here are a few recommendations you may consider to help mitigate risk from your BYOD policy: Have employees agree to a policy of notifying the company in a timely manner when a device is lost or stolen.  If the company uses technology to “wipe” corporate data from the mobile device ensure employees keep personal data separate or prevent company data from residing on the mobile device all together. Local laws may prevent an employer from wiping or “rooting” a mobile device upon loss, theft or employee termination.  If you do business in foreign countries be aware...

Bring Your Own Device (BYOD)

Bring Your Own Device (BYOD) Bring your own device (BOYD) is a recent trend where employees use their personal mobile devices including: iPhones, iPads, tablets computers and smartphones to access company information including your network, email, files and critical business applications. This policy can make your employees more productive. BYOD may save you the expense of buying mobile devices for your employees. However, if not managed appropriately, BYOD may open up security risks in your data protection strategy. Due to their mobile nature, these mobile devices are susceptible to theft and loss. Also, mobile devices may infect your network with viruses and malware, if they are not properly maintained. Here are some tips to minimize your exposure to employees who BYOD: Require Passcode to Unlock Device Requiring a passcode will prevent unintended access to your network or application data in case a user’s mobile device is lost or stolen. Keep OS/apps Up To Date To avoid virus and malware attacks on your mobile devices, it is a good policy to keep the operating system up to date with the latest security patches. It is also a good idea to keep your applications up to date to avoid a network security breach. Don’t Allow “Jailbreaking” of Operating Systems Some employees may “jailbreak” their iPhones or iPads so they can install additional applications and extensions that may not be available through the Apple Store. Jailbreaking may expose security breaches on these devices creating a weak link in your data protection plan. Services for Tracking and Wiping Most mobile devices will automatically check in to their geo-location when they are turned on....
Skip to content