Fail-Safe Measures

The safest computer system is one isolated from the rest of the world—with few network connections, and using old forms of bookkeeping and document retention. Unfortunately, this is...

Dan Alaimo
February 20, 2014

The safest computer system is one isolated from the rest of the world—with few network connections, and using old forms of bookkeeping and document retention. Unfortunately, this is less of an option as time goes on. 

Computer security doesn’t have to be expensive, but it starts with the basics like installing preventative measures, adding updates and patches, protecting passwords, paying close attention to firewall logs, and realizing that the bad guys really are out there, waiting for an opportunity.

Bring Your Own Device?

A growing trend in business is “BYOD” or bring your own device, allowing or encouraging employees to use their own laptops, smartphones, or tablets for business purposes.  Sometimes this practice comes with an attractive reimbursement; but whether it’s a safe move, security-wise, is a matter of opinion.

Keith Salustro, president of Security Best Practices in Boston finds it risky. “Because it is my device, it means I can take it home and let my kids use it, and the company can’t dictate what I am allowed to do.”  He discourages BYOD policies, favoring in-house devices because management can have much more control, especially with security.

Dave McCary at Zumasys, Inc. in Irvine, CA thinks BYOD is inevitable and a reality in today’s corporate world.  “There’s no way to stem the tide, particularly as you start to hire younger folks. Everybody walks in the door already owning a smartphone now.”

Many new hires simply don’t want a company phone, and would rather be paid a per diem to cover business costs on their own mobile device.  For businesses, this can create several problems including increased security risk to departing employees wanting to keep a phone number now associated with the company. 

Don Walborn, a veteran of the produce and software industries, says employers should be most concerned about workers losing their phones, laptops, or tablets. “These devices contain critical corporate information—customer lists, phone numbers, documents, and even portals to your main system.”  He recommends securing each device with a password and installing “find me” software able to not only can find the device, but completely wipe its data.

Dan Alaimo is a writer/editor specializing in the supply chain, technology, and marketing of food and related products.

nn-cta-image (1)

News you need.

Join Blue Book today!

Get access to all the news and analysis you need to make the right decision --- delivered to your inbox.

MEMBERSHIP BENEFITS

It’s not what you know,
it’s who you know.
Luckily, you know us

Subscribe to our newsletter