IT consumerization and personal devices brought into work create some tricky legal issues companies must take into account when they develop a BYOD policy.
3 reasons users break BYOD policies (and what you can do to stop it)
Hopefully, your organization is among the many that have implemented BYOD policies explaining what users can and can’t do with corporate info on mobile devices. And more than likely, you’ve had your fair share of of users who have broken the policy.
How to determine who’s at fault for a data breach
In addition to preventing data breaches, companies also must make sure they learn from incidents to improve their protection in the future. Part of that requires knowing who or what is to blame for a breach, as George Hillston discusses in this guest post.