By Jeff Sanchez, Managing Director
IT Security and Privacy
For IT security managers, Bring Your Own Device, or BYOD, is a four-letter acronym guaranteed to strike fear into their hearts by conjuring up visions of a data proliferation doomsday. But it doesn’t have to be that way. There is a way to create business benefits through the use of individuals’ devices while still maintaining control on data and reducing security and privacy risk.
The risks posed by employee devices with ever-increasing capabilities, such as tablet PCs and smartphones, are hardly new. Financial firms and other highly-regulated industries with a duty to protect sensitive customer data have been concerned about this for years, and many firms have BYOD policies in place to control the risk of data proliferation. But to be truly successful in this effort, organizations need to do more: They need to design and implement a BYOD strategy that…