by clicking on the page. A slider will appear, allowing you to adjust your zoom level. Return to the original size by clicking on the page again.
the page around when zoomed in by dragging it.
the zoom using the slider on the top right.
by clicking on the zoomed-in page.
by entering text in the search field and click on "In This Issue" or "All Issues" to search the current issue or the archive of back issues respectively.
by clicking on thumbnails to select pages, and then press the print button.
this publication and page.
displays a table of sections with thumbnails and descriptions.
displays thumbnails of every page in the issue. Click on a page to jump.
allows you to browse through every available issue.
FCW : September 15, 2013
65 CDWG.com | 800.808.4239 > Potential cost savings: An organization may save money by reducing its purchase of mobile devices and (for smartphones and tablets) its monthly data plan contracts. Note that these savings may be offset by the cost of additional security controls, technical support for BYOD users and other costs associated with deploying any technology securely. Also, many organizations choose to pay for their workers' personal data plan contracts for smartphones and tablets, which would otherwise be the primary area of savings for the organization. Improved disaster recovery: Implementing BYOD can significantly improve an organization's disaster recovery capabilities. Should a disaster occur, workers can use their devices to remotely access the organization's resources. Also, across the organization, staffers are likely to be signed up with a variety of carriers, unlike a traditional organization-driven mobile strategy, which typically relies on a single carrier. e use of multiple carriers provides stronger redundancy in case one carrier has an operational problem. Stronger protection of sensitive information: Taking an integrated approach to BYOD security means closely examining and evaluating the risks involved in BYOD usage. is can lead to levels of protection that are equivalent to (or even stronger than) the organization's typical security posture. is helps safeguard sensitive information from unauthorized access and disclosure. Device Defense Securing BYOD devices requires thorough research into the solutions available. Securing a mobile device can be a surprisingly difficult endeavor, and this is particularly true for BYOD programs. People who are used to the security controls and tools available for enterprise-controlled desktop and notebook computers may be surprised at the relative lack of corresponding controls and tools for BYOD mobile devices. It's not that security controls and tools aren't available for these devices, but that they're not integrated into mobile devices in general. is requires the organization to get the device owners to install various security tools on them and change security configurations for the OSs and various applications. e complexity of this process and its numerous moving parts contributes to the difficulty that users have in securing their own devices. On the surface, it may make sense to have users maintain the security of their own devices. After all, if they want the freedom to use their own devices, then accepting responsibility for security seems appropriate. But given the difficulty in securing devices across a BYOD program, it's unrealistic to expect users to secure their personal devices effectively and to maintain that security on their own without oversight and assistance from the IT security team. Not only can security be very complex, it's also time-consuming to maintain manually. For example, consider the effort involved in keeping up with all the patches for the operating system and major applications on a device. BYOD security maintained by users is also error-prone. Manually entering security configuration settings and selecting patches is highly subject to human error. Another factor complicating personal device security is that there are new mobile devices rolling out constantly. Each new model is likely to have its own unique security features, possible vulnerabilities and significant differences in security characteristics compared with earlier models, even within the same brand. Another consideration is that cellular carriers may customize their own OSs and add other changes to smartphones and tablets that affect security.
August 30, 2013
September 30, 2013