Business Transfor...
Follow
Find
12.1K views | +2 today
 
Scooped by Karl Wabst
onto Business Transformation
Scoop.it!

Don't adapt old IT security policies for BYOD: IBM | ZDNet

Don't adapt old IT security policies for BYOD: IBM | ZDNet | Business Transformation | Scoop.it

Many organisations are simply retrofitting existing IT security policies for mobile devices in the workplace, but they should really be formulating a BYOD policy from scratch

Karl Wabst's insight:

Old security policies are often ignored. Modeling BYOD policies on failed standards will likely result in new policies that will also be ignored.

 

Take the opportunity to educate leaders and staff on how mobile and employee-owned devices create new opportunity and risk.

more...
Jacqui Hogan's curator insight, July 31, 2013 11:03 AM

And if you decide to go BYOD, how NOT to do it.

Business Transformation
Corporate and Business Strategy and Execution in the Post Industrial, Digital Economy. Want to know more? Visit me on LinkedIn: www.linkedin.com/in/karlwabst/
Curated by Karl Wabst