by clicking on the page. A slider will appear, allowing you to adjust your zoom level. Return to the original size by clicking on the page again.
the page around when zoomed in by dragging it.
the zoom using the slider on the top right.
by clicking on the zoomed-in page.
by entering text in the search field and click on "In This Issue" or "All Issues" to search the current issue or the archive of back issues respectively.
by clicking on thumbnails to select pages, and then press the print button.
this publication and page.
displays a table of sections with thumbnails and descriptions.
displays thumbnails of every page in the issue. Click on a page to jump.
allows you to browse through every available issue.
FCW : September 15, 2013
64 COVER STORY SECURING BYOD Security is a prime concern with a BYOD initiative. particular organization is unique, tailored to that entity's requirements, technologies and environments. BYOD: e B Is for Benefits In most organizations, BYOD can't be used if it can't be secured effectively. Benefits that an organization can hope to gain through secure BYOD deployment typically include some of the following: Increased worker satisfaction: BYOD lets workers choose the device that they use. This generally gives staffers greater satisfaction than if they don't have a choice and must use the device selected for them by the organization. BYOD also allows people to have a single device for both personal use and work, instead of having to carry, secure and maintain separate devices --- another satisfaction driver. More productive staff members: Enabling access to the organization's resources through BYOD means that workers can be more productive because they can do their work on their own schedule, from whatever location is convenient for them. Also, allowing staff to choose their devices lets them pick ones that they're more knowledgeable about and more comfortable with --- yielding greater productivity from them. obile computing is becoming so ubiquitous that people no longer bat an eye seeing someone working two devices simultaneously. Individuals and organizations are responding to the capabilities and flexibility that mobile devices provide. Between work-issued and personally owned devices, it's not uncommon for a person to have two notebooks and two smartphones. But ultimately, people find relying on this many devices inconvenient, and organizations find it expensive. e solution to tackling this problem? Bring your own device. BYOD refers to using a personally owned device, such as a tablet or smartphone, for work purposes. Unfortunately, personal devices are generally harder to secure than organization-issued devices. Using these devices can put the organization's information and M systems at higher risk of compromise. But personal devices can be secured effectively if organizations take an integrated approach to security. Breaking away from traditional notions of mobile security, an integrated approach considers BYOD security in the context of devices, data and networks to design the right solution. ere is no silver bullet that is the be-all, end-all answer to BYOD security. e solution that works best for any THE PERCENTAGE OF ORGANIZATIONS THAT HAVE ROLLED OUT A BYOD SECURITY STRATEGY. 43% Source: 2012 PwC Global State of Information Security Survey
August 30, 2013
September 30, 2013