MARCH 28, 2014
Your regular source of security updates from TrendLabsSM
In This Issue

Security Spotlight
Connecting Online and Real-World Threats

Security for Home Users
The (Cybercriminal) Lure of Social Media

Security for Business
Separating Your Work from Your Personal Life



Security for Business

Separating Your Work from Your Personal Life

Coming up with BYOD policies, like any other company policy, requires much thought, preparation, and planning.”



The future of enterprises is heading toward personal device use. Bring-your-own-device (BYOD) is becoming mainstream. Gartner, in fact, predicted that 50% of employers will require employees to use their own devices for work by 2017. What can this mean?

BYOD: Boon or Bane?

According to a survey, whether or not a company adopts BYOD depends on several factors. Increased productivity often tops the list of reasons, followed by easier access to company data and allowing employees to use their own devices for work.

BYOD often blurs the line between what’s work-related and what’s personal. For example, seven out of 10 employees use company-owned tablets to download apps for personal use. Meanwhile, 37% of employees use personal laptops to store and work on corporate data.

BYOD also comes with risks. In fact, almost half of the total number of companies that adopt BYOD have suffered data breaches brought on by the use of employee-owned devices to access corporate networks. Two out of five “major breaches” were caused by the loss or theft of devices containing corporate data.

BYOD in the Workplace

Coming up with BYOD policies, like any other company policy, requires much thought, preparation, and planning. Successfully implementing BYOD policies in the workplace requires a balance between control and freedom. BYOD should give employees flexibility in their work approach and easy access to company resources. But it should also allow IT adnimistrators to implement certain restrictions or rules to protect corporate data.

Protecting company data should be the top priority of every company, especially one that adopts BYOD. Specialized solutions—like those for mobile device management—can let IT administrators safely create a secure environment for corporate apps and data as well as lessen the chances of data loss and leakage.

Copyright ©2014 Trend Micro Incorporated. All rights reserved. Trend Micro and the Trend Micro t-ball logo are trademarks or registered trademarks of Trend Micro Incorporated. All other company and/or product names may be trademarks or registered trademarks of their respective owners. The information contained in this document is subject to change without prior notice.

www.trendmicro.com

  CONNECT WITH US ON: