Posts Tagged ‘mobile security’

CYOD: What you need to know

October 1, 2014
gdkshjl

CYOD is becoming the device policy of choice for many companies.

Though BYOD is beginning to dominate many industries, many organizations are implementing a similar but slightly different device use strategy — CYOD. A CYOD policy allows an IT department to provide employees the ability to choose from a set of specific, company-approved and issued devices. This still allows IT departments to maintain more control over data and security, but also provides employees with some freedom to use a device they’re comfortable with.  In many companies, it’s proven to be a successful compromise that allows employees the freedom to work as they please and IT departments the supervision necessary to protect company information. Below are a few points to consider when developing a CYOD policy for your organization:

Company Needs

A CYOD policy will be more limiting to employees than a BYOD policy. For some companies, this may not be much of an issue, but depending on employee needs, some may find a CYOD policy too restrictive to serve as a practical solution. Be sure the type of policy your business develops is tailored to the needs of your company and its employees, and allows them to work functionally.

Employee Satisfaction

BYOD is often popular with many employees, as it allows employees to use their personal devices for both work and recreational purposes, but it isn’t always popular with IT departments concerned about security. CYOD still ensures that employees can be comfortable with their device, while also providing the necessary protection for data. If employees are hesitant to transition away from BYOD, consider offering a wide variety of devices for them to choose from.

Monitoring Usage

Installation of personal apps that could compromise security or inhibit productivity can be much more easily monitored from company-owned devices IT has access to. Some companies reported huge rises in bandwidth after implementing a BYOD policy. A CYOD policy limits personal usage a bit more, and often encourages employees to focus more on work when using a company-owned device.

Security

Security concerns are often the primary reason organizations are hesitant to implement a BYOD policy. CYOD provides an additional layer of security, while still providing employees the capability to work outside the office with a device they’re comfortable with. Data is much more secure in a regulated environment.

Version Control 

Varying types of software, apps, and new updates can complicate usage and prevent employees and IT from remaining on the same page. Even apps that are available for several types of operating systems don’t always function the same across each one, especially after an update. This can be extremely challenging for IT departments to keep up with. Having only handful of updates to handle on a few select devices is much more seamless. If application and software differences have previously been a huge headache for your company, CYOD may limit difficulties that arise when new versions of software are released.

Cost

It will cost companies more to purchase devices for their employees rather than allow them to use what they already own. However, BYOD policies can create other unexpected costs for companies in the long-run, whereas most of CYOD policy costs will be upfront. Plan accordingly, and see which policy makes more sense for your company financially.

While some experts believe CYOD policies are the way of the future and may even make BYOD obsolete within the next year, they may not be right for every business. Be sure to thoroughly examine the unique needs of your organization before determining the type of policy it requires. You can even use online guides to help you weigh the most important factors and make the best business decision.

Avoid These BYOD Pitfalls

September 24, 2014
dgjdfkl

Avoid these common BYOD risks that could jeopordize company data or employee privacy.

While implementing a BYOD policy can be extremely beneficial for many organizations, every company’s policy must be tailored to its individual needs in order to be successful. Failing to create a functional BYOD policy could ultimately cost your company more money and sacrifice the security of your data. Avoid these common mistakes when developing a BYOD policy for your organization:

  • Unclear Expectations

    • Employees should have an extremely clear understanding of what exactly their BYOD policy entails. Every employee should know their rights and restrictions, as well as the company’s. Lack of information often causes employees to use their devices in ways that could be harmful to the privacy of business data or their own personal information. Be sure all employees know what is acceptable behavior under the policy and what is not, and how they should proceed should they lose their data or their device.
  • Lack of Employee Privacy 
    • Whether employees truly lack privacy or simply feel they do, a device that they fear is exposing their personal information will likely be one they often avoid using. Especially with devices that track location, many employees feel they’re being too closely monitored by their employer and that their privacy is being invaded. Companies should try to strike a balance that allows employee information to be protected, while still allowing them the necessary accessibility to the information they need or want to use.
  • Unenforced Restrictions 
    • Policy regulations that aren’t strictly enforced are often seemingly nonexistent, and employees will be more likely to break them, perhaps without even realizing it. A lack of policy for protecting data will likely result in its vulnerability and ultimate breach. Once your IT department establishes necessary rules, be sure employee compliance is being monitored accordingly, and that employees are also informed of the consequences of violating regulations.
  • Balancing Security Measures
    • It can be difficult to draw a line between personal and professional use when it all occurs on one device. Should personal apps be prohibited on personal devices just because they aren’t work related? Rules and restrictions should be clear with employees, and finding a way to compromise use without compromising security is ideal. Geo-fencing is one of many ways some organizations are finding a happy medium for both IT departments and particpating employees.

While these tips may be helpful to developing a functional BYOD policy for your business, not every business is the same, and these recommendations may not be helpful or correct for every organization. Be sure to evaluate your company’s individual needs accordingly before making any decisions. You can even use online resources to help you better evaluate your company and its needs.

Document Management Industry Roundup: September 5, 2014

September 5, 2014
jldsbjlfgdkh

The next iOS update could be a huge hit with those working in BYOD organizations.

What’s new in the industry this week:

1. Changing and accelerating mobile technology is changing the way we work—when, where, and on what devices. See what ELC executives had to are saying about the future of mobile: http://bit.ly/1t5EIxy

2. As governments continue try to cut costs and improve economies, cloud computing has proved to be an effective and reliable data management solution for those struggling areas: http://bit.ly/WhhcCR

3. The best ECM solutions may not definitively solve problems, but are flexible and able to continuously shift to fit an organization’s changing needs: http://bit.ly/1qAvlpU

4. Dedicated Apple users are highly anticipating next week’s official iPhone 6 announcement. Here’s why the new phone and iOS 8 could be a huge hit with enterprise users working in BYOD environments: http://zd.net/1xgZelj

Don’t miss these upcoming events:

Our Director of Marketing, Jackie Risley, will be hosting a webinar with The Institute of Financial Operations on 9/23, discussing AP automation and analytics. Don’t miss it! Register here: 

Don’t miss us at the IOFM AP Conference West October 26-28 in Las Vegas, Nevada! Attend and learn how FileBound can revolutionize invoice processing.

Mark your calendars for April 27-30, 2015, and attend the second annual Upland User Conference! The FileBound team will be there in Lake Buena Vista, Fla., at Disney’s Beach and Yacht Club with the rest of the Upland Software family.

The New Mobile Reality – Forget About Apps; Get Moving on Workflows

September 4, 2014
gjdfiskguoidrg

See what ELC executives are saying about the future of mobile technology.

Changing and accelerating mobile technology is changing the way we work—when, where, and on what devices.

The AIIM Trendscape report, “The New Mobile Reality,” explains how organization leaders are rethinking the way their employees are utilizing enterprise systems, and how the information manager executives of the ELC are reshaping and guiding future mobile solutions.

Download our whitepaper for the full, detailed report outlining the latest in the information management world: http://bit.ly/1nJzHYa

Document Management Industry Roundup: July 11, 2014

July 11, 2014
gjdklsgk;ld

It was a great week for FileBound and our partners! We hosted our Solution Architect training seminar and our summer BBQ.

What’s new in the industry this week:

1. This week, we were in Texas with Access Imaging Solutions at the Secretary of State Election Law Seminar!

1937460_10154402905715595_4734661777575887496_n

2. Attend our latest training seminar without leaving home. Our FileBound Certified Engineer (FBCE) Boot Camp provides personalized instruction, no matter where you’re located. Sign up here: http://bit.ly/1nflTYF

3. Our partner, Epson America, provided our Solution Architect training class with new printers for our 17 students, and helped make the seminar a success.

FB_Epson1

4. BYOD policies don’t have to be so complicated. Here are five security precautions you no longer need to take: http://bit.ly/1qRNjVL

5. If you missed our June 12 webinar outlining the newest features of FileBound 7, view it on-demand at your convenience: http://bit.ly/1nflTYF

6. The FileBound team great time at our BBQ this week! Thomas Kernes and Blake Gilmore won our competitions with their ribs and pie. We were also glad to have our 18 trainees, president, and new VP of HR in attendance!

10293704_10154417603865595_3512448021863131365_o

Don’t miss these upcoming events:

Our partner, AIIM, will be hosting its annual Round the Lake Dinner Cruise on Tuesday, August 12, from 6 p.m.-9:30 p.m. Both users and vendors are welcome to enjoy a leisurely ride around Lake Washington while socializing with partners, colleagues, and friends. We hope you can attend! http://bit.ly/AIIMcruise

The second annual Upland User Conference was announced this week! Mark your calendars for April 27-30, 2015. The FileBound team will be there with the rest of the Upland Software family!

10495334_308558729319388_5118922776048102570_o

Document Management Industry Roundup: June 6, 2014

June 6, 2014
Though FileBound Olympics were the most important events in our office this week, the industry was still busy with conferences, new insights, and launches.

Though the FileBound Olympics were some of the most important events in our office this week, the industry was still busy with conferences, new insights, and launches.

What’s new in the industry this week:

1. This week, Apple announced iOS 8 and new version of OS X, Yosemite. See all the new features, set to be released this fall: http://on.mash.to/1tIbcND

2.  Mobile security is a hot topic for almost every company in our industry. Find out the latest insights on mobile security and BYOD. http://bit.ly/1oliDLg

3. Our parent company, Upland Software, was at the Gartner PPM and IT Governance Summit earlier this week, learning the latest industry news, and hosted a panel discussion with senior IT and PPM leaders on structuring PPM to cultivate both strategic and execution objectives in the most agile way possible.

4. We hosted our FileBound Olympics! You can take a look at all the different events here: http://on.fb.me/1oliCqI

Don’t miss these upcoming events:

If you’re interested in learning more about all of FileBound 7’s new features, we’re hosting a webinar and giving an in-depth overview of all the upgrades. Join us June 12: http://bit.ly/1oliOGi

Sign up for our FileBound Solution Architect Boot Camp and learn how you can use FileBound to build a complete business solution to your workflow needs. Contact your account manager to sign up for and learn more information about our  course:

  • Monday, July 7 – Thursday, July 10
  • 8:30 a.m. – 5 p.m. daily (lunch and refreshments provided)
  • FileBound by Upland, 1701 Cushman Dr., Lincoln, NE

Miss any essential document management industry news this week? We’ve got you covered! (Oct. 29-Nov. 2)

November 2, 2012

Hurricane Sandy caused massive power outages in the Northeast. How does this affect technology and cloud computing? Read on to see.

This week’s important resources:

1. What do you think of the Windows 8 release? Are you more excited about Microsoft’s new operating system or the Surface tablet? http://bitly.com/PSJpw7

2. Hurricane Sandy hit this week, causing power outages across the Northeast. Here are five tips to keep your cellphone charged during a power outage. http://bit.ly/Q2ErNn

3. Web outages due to Sandy’s presence on the East coast caused some cloud issues, but Netflix handled the situation well. http://bit.ly/VBia66

4. Mobile security: New blacklist may deter thieves. “The point of the blacklist database is to dry up the aftermarket for stolen phones. If you can’t reactivate a stolen phone, it’s just a worthless hunk of plastic and metal.” http://bit.ly/Y7EatB

In case you missed our latest blog post:

White Paper: Clear Cost Model Allows Easy ROI Calculations. http://bit.ly/TnhEGK