5 Tips to Establishing a Secure BYOD Policy

Brett Harney BYOD, Network Security

‘Normal office hours’ are becoming a thing of the past. Your team is accessible almost anytime and anywhere, and your clients are reaping the benefit. The use of mobile devices, especially smartphones, in the workplace has skyrocketed. Businesses are reporting improved collaboration of dispersed teams, increased productivity overall, and reduced costs to the business by allowing mobile devices to be …

5 Cybersecurity Tips to Protect Mobile Devices

Brett Harney BYOD, Network Security

This article from was originally written for all those students that recently headed off to campus this fall. But the cybersecurity tips to protect against identify theft are valuable for anyone with mobile devices… especially those that B.Y.O.D. to work. According to re:fuel Agency’s 2014 College Explorer report, the average college student brings seven Internet-connected devices (smartphones, notebooks and …

Advice for Businesses Living in a BYOD World

Brett Harney BYOD

What else are your employees packing besides their lunches? It’s a Bring Your Own Device (BYOD) world for many small businesses. Which can be advantageous, but BYOD raises a number of data protection concerns since the device is owned by your employee rather than your company/data controller. Has your company thought about the risks of BYOD? The article “How to integrate BYOD into a small business” from Tech Radar outlines steps to develop your business’ BYOD policy and securely integrate BYOD across your company:

Disaster Recovery

Saving Money with BYOD

Brett Harney BYOD

Bring Your Own Device (BYOD) is not just a buzz word… it is a real, growing, bandwidth-eating presence on our client’s (and your) networks.  And as I was preparing to write my blog post today, an article from Network World popped up ent…