Security School

Managing BYOD endpoint security

This Security School is a free multimedia learning guide designed to help you understand and address the strategic and tactical implications of this topic.

The top five employee responsibilities in a BYOD security strategy

Behind any successful enterprise BYOD strategy are employees who do the right things.

FROM THE SECURITY SCHOOL:

Managing BYOD endpoint security

SECURITY SCHOOL SECTIONS

  1. Webcast
  2. Webcast
  3. Tip
  4. Podcast
  5. Quiz
  6. Expert
+ Show More

Formulating a security strategy for the BYOD era is just the first step in managing mobile devices in the enterprise. In this podcast, wireless and mobility expert Craig Mathias runs down his top-five list of what must happen after the policy is set, and all five depend on employees making the right moves.

These right moves include employees recognizing the value of keeping proprietary information secure, and understanding the costs to the company (and potential threat to jobs) if sensitive information is leaked. Another employee responsibility is to make sure the IT department vets all devices (and their operating systems) brought into the company. IT has responsibilities too, of course -- most of all to make sure not just that employees are trained but that they are listened to. No one benefits, Mathias explains, when difficult enterprise security rules tempt employees to devise "work arounds."

Listen to the podcast to learn more about these points, and the others, that together comprise a comprehensive list of the most important responsibilities employees have in making BYOD policy succeed.

 

This was last published in June 2014

PRO+

Content

Find more PRO+ content and other member only offers, here.

Security School

Managing BYOD endpoint security

SECURITY SCHOOL SECTIONS

  1. Webcast
  2. Webcast
  3. Tip
  4. Podcast
  5. Quiz
  6. Expert

Start the conversation

Send me notifications when other members comment.

By submitting you agree to receive email from TechTarget and its partners. If you reside outside of the United States, you consent to having your personal data transferred to and processed in the United States. Privacy

Please create a username to comment.

-ADS BY GOOGLE

SearchCloudSecurity

SearchNetworking

SearchCIO

SearchConsumerization

SearchEnterpriseDesktop

SearchCloudComputing

ComputerWeekly

Close