EDITOR’S QUESTION
HOW BEST CAN CIOs ENSURE
BYOD IS BEING ADEQUATELY
IMPLEMENTED ACROSS
OPERATIONS WITHOUT
ENDANGERING SECURITY
PROTOCOLS?
B
YOD is currently firmly
embedded in the daily lives
of the modern workforce, and
whether CIOs openly embrace this
new trend, it is a security concern
that cannot be ignored. An enterprise
must think beyond the technological
challenges; it must address business
policies, legal policies, management
processes and governance as well.
The Bring-Your-Own-Device (BYOD)
ownership model is no longer hype
or a privilege of early adopters.
According to Gartner: “By 2017, half
of employers will require employees
to supply their own device for work
purposes.” Businesses everywhere
have acknowledged the benefits
that a BYOD model delivers –
including [\