Customer-Vendor Alignment, IT Governance & Data Security   /     Embracing The Age of Mobility - Part 1 of 6

Summary

Part 1: The Good, The Bad, and the Ugly of Mobility and BYOD There are a lot of advantages to mobility in today’s workforce, but the Bring-Your-Own-Device (BYOD) movement has also brought its share of headaches as well. We live in a society where everyone must have the newest technology. We are inundated with ads reminding us that the smartphone or tablet we just bought a year ago is laughably outdated and inferior to the upgrade that just hit the market. People who have just bought the latest technology don’t want to have to set it aside to use a separate company-issued device. As a result, businesses are beginning to grant these employee-owned devices access to their file and email servers, databases, and applications. While this brings certain competitive advantages to employers, it naturally carries many risks, too.

Subtitle
Part 1: The Good, The Bad, and the Ugly of Mobility and BYOD There are a lot of advantages to mobility in today’s workforce, but the Bring-Your-Own-Device (BYO
Duration
00:32:00
Publishing date
2015-03-10 17:30
Link
http://www.blogtalkradio.com/the-manuel-w-lloyd-consulting-show/2015/03/10/embracing-the-age-of-mobility--part-1-of-6
Contributors
  IT Management Talk Show
author  
Enclosures
http://www.blogtalkradio.com/the-manuel-w-lloyd-consulting-show/2015/03/10/embracing-the-age-of-mobility--part-1-of-6.mp3
audio/mpeg

Shownotes

Part 1: The Good, The Bad, and the Ugly of Mobility and BYOD There are a lot of advantages to mobility in today’s workforce, but the Bring-Your-Own-Device (BYOD) movement has also brought its share of headaches as well. We live in a society where everyone must have the newest technology. We are inundated with ads reminding us that the smartphone or tablet we just bought a year ago is laughably outdated and inferior to the upgrade that just hit the market. People who have just bought the latest technology don’t want to have to set it aside to use a separate company-issued device. As a result, businesses are beginning to grant these employee-owned devices access to their file and email servers, databases, and applications. While this brings certain competitive advantages to employers, it naturally carries many risks, too.