An outgrowth of Mobile Cloud Computing is BYOC (Bring Your Own Cloud). However, instead of the Cloud service being taken to work, it is used abroad. We are a far cry from the offices of yesteryear, which did all their business from claustrophobic cubicles. Now, today’s workforce is free to go mobile and use systems such as Cloud to access work projects, suppliers, business partners, and customers wherever they travel.
However, this convenience raises the spectra of a cyber-security nightmare. Since sensitive business data is kept in Cloud storage outside the company’s security realm, the wrong people may invade it. For example, many of you have heard the news stories about stolen employee laptops, which contained highly private customer info…such as their social security numbers, etc. This was a public relations disaster!
Michael Guadagno & Associates can aid your company in making a preemptive strike to try and prevent such worst-case scenarios from occurring. As such, we will give professional guidance to your management on how to navigate away from the destructive storms of controversy that Cloud and other BYOD’s can potentially create:
BYOD / BYOC Cyber Security
First, we will discuss the importance of powerful device passcode enforcement, plus, how to/or how not to choose a code.
- Next, we’ll move on to DLP (Data Loss Prevention), Antivirus Protection, and how to choose the most effective cutting edge products containing these features in the present. Then, we’ll instruct how to be aware of what cyber security upgrades are coming to the marketplace in the near-future.
- We’ll explore the question of what potential security hazards could arise from the next hot trending device on the horizon.
- Then, we’ll have a look at how to choose and use full-disk encryption, removable media, and Cloud storage.
- Also, we’ll familiarize your management with using application control features.
- We’ll especially emphasize how to use MDM (Mobile Device Management) to destroy sensitive data when a device’s security has been compromised by loss, or theft.
- Additionally, we’ll point out the alternate choice of using a malware scanner to remotely lock the vital data on a missing device. There is such a scanner, which works with *Android apps.
The bottom line is to encourage forward thinking in computer security to keep one, or more steps ahead of an intruder’s game.
* Disclaimer: [Michael Guadagno & Associates do not work for, or market any devices for their respective manufacturers.]