Tag Archives: BYOD

How Are You Erasing the Data on Your Mobile Devices?

mobile device managementMore and more people are using smartphones and tablets for their primary workplace computer, causing IT asset managers to take a closer look at their data destruction practices.

This phenomenon is something we’ve discussed on this blog before. Some offices have what’s known as a BYOD – “bring your own device,” while others tell their workers “Choose your own device” (CYOD), letting them pick from a list of preapproved devices.

It’s not something every company has embraced – in fact, some companies ban it. But if your company has a CYOD policy, it’s worth looking at some methods available to erase data from mobile devices.

Continue reading

Is BYOD Here to Stay?

BYODWe’ve written before about the “bring your own device trend” in the workplace, but a recent survey seems to suggest that the BYOD movement may be on the decline.

The survey, conducted by the nonprofit trade group CompTIA, found that the number of companies banning BYOD policies has grown by nearly 20 percent over the past two years, from 34 percent in 2013 to 53 percent in 2015.

“It’s not quite the death of BYOD, but there does seem to be a decrease in the use of BYOD in enterprises,” said Tim Herbert, CompTIA’s vice president for research and marketing intelligence, speaking in an interview with ComputerWorld.

Continue reading

BYOD. CYOD. Either Way, Time to Secure Your IT

BYODDoes your office have BYOD (“bring your own device”) policy?

Or do you prefer to have your workers CYOD (“choose your own device”)?

The two sound the same, but there’s a fairly crucial difference. BYOD means a company allows workers to use technology – tablets, smartphones, or laptops – they brought from home. It can save an organization on hardware costs, and makes employees feel more comfortable. The downside, as Forbes noted last year, is that a BYOD fleet is much harder to secure.

In a CYOD office, workers need to pick from a list of preapproved devices, which makes them easier to secure. In either case, the security of your company’s data is key.

Continue reading