Welcome to Blue Book!
Are you ready to join the thousands of companies who rely on Blue Book to drive smarter decisions? View our plans and get started today!
Still have questions? We’d love to show you what Blue Book can do for you. Drop us a line– we’ve been waiting for you.
The safest computer system is one isolated from the rest of the world—with few network connections, and using old forms of bookkeeping and document retention. Unfortunately, this is less of an option as time goes on.
Computer security doesn’t have to be expensive, but it starts with the basics like installing preventative measures, adding updates and patches, protecting passwords, paying close attention to firewall logs, and realizing that the bad guys really are out there, waiting for an opportunity.
Bring Your Own Device?
A growing trend in business is “BYOD” or bring your own device, allowing or encouraging employees to use their own laptops, smartphones, or tablets for business purposes. Sometimes this practice comes with an attractive reimbursement; but whether it’s a safe move, security-wise, is a matter of opinion.
Keith Salustro, president of Security Best Practices in Boston finds it risky. “Because it is my device, it means I can take it home and let my kids use it, and the company can’t dictate what I am allowed to do.” He discourages BYOD policies, favoring in-house devices because management can have much more control, especially with security.
Dave McCary at Zumasys, Inc. in Irvine, CA thinks BYOD is inevitable and a reality in today’s corporate world. “There’s no way to stem the tide, particularly as you start to hire younger folks. Everybody walks in the door already owning a smartphone now.”
Many new hires simply don’t want a company phone, and would rather be paid a per diem to cover business costs on their own mobile device. For businesses, this can create several problems including increased security risk to departing employees wanting to keep a phone number now associated with the company.
Don Walborn, a veteran of the produce and software industries, says employers should be most concerned about workers losing their phones, laptops, or tablets. “These devices contain critical corporate information—customer lists, phone numbers, documents, and even portals to your main system.” He recommends securing each device with a password and installing “find me” software able to not only can find the device, but completely wipe its data.