Main Menu
Home / CIO / How CIOs Can Navigate Treacherous BYOD Waters

How CIOs Can Navigate Treacherous BYOD Waters

Beware of pirates who steal confidential data. They are big advocates of bring your own device. However, that doesn’t mean you shouldn’t set sail on the good ship BYOD, but you should also be careful as you navigate uncharted waters. Tom Kaneshige of cautions you to be prepared for attacks at any moment. Make sure your cannons are loaded and your swashbuckling skills are up to snuff, because he proposes 12 different ways that BYOD could go rouge.

His list includes a few givens like the productivity problem and a widening trust gap between employee and employer. Then there are a few more serious issues like text messaging theft and employees failing to report lost phones. Not all thieves will identify themselves with eye patches and swords, but sometimes lost data can be more precious than the gold coins used to recover it. Wherever your organization stands on bring your own device, be prepared to face the adventure it brings.        

About Rachel Ginder

Rachel Ginder was a staff writer for CAI's Accelerating IT Success and joined the team in 2013. She also helped with social media and research.

Check Also

3 Misconceptions to Dispel about AI

AI used to be something exciting and futuristic, but IT organizations have already managed to …

Leave a Reply

Your email address will not be published. Required fields are marked *

Sorry, but this content
is for our subscribers only!

But subscribing to ACCELERATING IT SUCCESS is FREE and only one click away!
Join more than 40,000 IT Professionals and get the best IT management articles to your mailbox with Accelerating IT Success!

Unsubscribe at any time