Towerwall's InfoSec Blog

Content Type

See all

Beware of BYOD trend wreaking havoc

BYOD , Mobile Devices , Security Threat , GDPR , Information Security , Security , Mobile Apps , Hackers , cyber-attack , security policy , cybercriminals , Tablets , Security Alert , information security tips , Mobile Protection , COVID-19 , Mobile Security , cannabis , cybersecurity , Enterprise

Michelle Drolet

Bringing mobile devices to work? Not so fast. Like it or not, the line between the workplace and the home is blurring. Work-at-home arrangements are becoming more common and cloud services make it easier to co-ordinate teams online. People are constantly on call, with the ability to check their emails and stay in touch wherever they are. The days of having a personal mobile and a work device are fast disappearing as the BYOD (Bring Your Own Device) trend continues to grow. A recent SkyDoxfalse

Introducing Towerwall's BYOD Policy Services

Security Partners , Security Services , Data Security , BYOD , Information Security , Security , security policy , information security tips , Mobile Protection , Mobile Security , cannabis , cybersecurity , Enterprise

Michelle Drolet

BYOD means Bring Your Own Dilemma

network security , Security Services , security software , BYOD , Security Regulations , Security Threat , Information Security , Security , Hackers , cyber-attack , security policy , cybercriminals , Tablets , Security Alert , information security tips , Mobile Security , cybersecurity , Enterprise

Michelle Drolet

It’s becoming more and more common for workers to store work-related documents on their smartphones, tablet computers and other devices they bring to and from work each day. While this can be convenient--employees can access important documents at home or on the road--it also creates greater security risks for businesses.

Beware of BYOD Harming your Company

Security Partners , network security , security software , Data Security , BYOD , Security Regulations , Security Threat , Security Program , Information Security , Security , Cloud Security , security policy , Security Alert , information security tips , security research , Mobile Security , cannabis , cybersecurity , Enterprise

Michelle Drolet

It’s becoming more and more common for workers to store work-related documents on their smartphones, tablet computers and other devices they bring to and from work each day. While this can be convenient -- employees can access important documents at home or on the road --it also creates greater security risks for businesses.

10 Things to Know Before Creating BYOD Policy

Security Services , Data Security , BYOD , Security Threat , Security Program , Security , software updates , Cloud Security , security policy , penetration testing , security research , cannabis , cybersecurity , Enterprise

Michelle Drolet

In recent years, the work place has become more mobile than ever, and the mobile worker revolution is, in large part, the reason for the rise in Bring Your Own Device (BYOD) policies. The big idea is that through the use of cloud computing-based collaboration platforms, enterprise-class companies can save a great deal of money in IT, security and overall operational costs. While this would seem like a no-brainer, more companies are learning that the opposite is true. Both executives andfalse

Why You Need A Mobile Device Policy

Security Partners , network security , Security Services , security software , Data Security , BYOD , Security Regulations , Mobile Devices , Security Threat , cisco , Security Program , Information Security , Security , Mobile Apps , Hackers , Cloud Security , cyber-attack , security policy , cybercriminals , Security Alert , information security tips , Compliance , Mobile Protection , Mobile Security , cannabis , cybersecurity , Enterprise

Michelle Drolet

Whether you choose to embrace it or try to resist it, the BYOD (Bring Your Own Device) trend is set to grow. A study by Cisco Systems found that 78 percent of white-collar workers in the U.S. use a mobile device for work and 41 percent indicated that most smartphones that connect to the company network are actually employee-owned. So, if you don't already have a BYOD policy, you need one. Employees will connect to your network and use their personal mobile devices for work, whether you allow itfalse