Written by: Christina Goggi
One of the big buzz words in IT for the past several years has been BYOD (Bring Your Own Device). BYOD scenarios are starting to crop up everywhere, from small businesses all the way up to federal government agencies. One of the biggest challenges SysAdmins, security professionals and CIOs all face is how to secure these devices.
One trend that is growing in popularity involves the approach of “securing the data, not the device”. While that sounds great and should definitely be a part of your security strategy, if you think you can get away with securing your data while ignoring all those devices, you are only a breaking news story away from a very embarrassing situation. Defense in-depth strategies require you to secure more than just the data, and the devices your users use are a key component, whether you paid for them or they did.