Many organizations think that the prep work for a new cloud storage or hosting option is hardest part. But evaluating vendors, choosing a plan of attack and beginning the migration process can only be the beginning of companies’ problems.
When this worker was fired from her job, she quickly sent sensitive information to a private email account. But when the company took her to court, a judge actually ruled in her favor. Find out why – and what you can do to avoid similar legal trouble.
Most users who agree to BYOD policies do it reluctantly because of two main hang-ups: They are afraid of having personal devices wiped if they’re lost or stolen, and they don’t want IT to be able to monitor what they do on their phones.
Bring your own device (BYOD) programs call for three critical components: a software application for managing the devices connecting to the network, a written policy outlining the responsibilities of both the employer and the users, and an agreement users must sign, acknowledging that they have read and understand the policy.
Forget the Internet of Things. IT is still struggling to keep up with another, well-established threat: mobile security incidents. And research shows this one’s getting more and more costly.