10 Ways To Circumvent BYOD Threats
On EWeek.com, Chris Preimesberger writes about managing the IT security nightmare created by staff bringing their own devices to work, and lists 10 ways to circumvent threats.
“Let’s face it: A plethora of mobile devices exist and are brought into the workplace by employees who assume the right to use them– with or without IT’s approval.”
The article, IT Security & Network Security News & Reviews: Security Defenses: 10 Ways To Circumvent Threats With a Sound BYOD Policy, includes a slide presentation with recommendations from Citrix Chief Security Strategist Kurt Roemer, who leads security, compliance, risk and privacy strategy efforts for Citrix products. He points out that it’s not necessary to control the employees’ devices, just the sessions and data that will be used on them. He also discusses the security relationships that exist with Cloud era networks.