As technology has advanced and each of us has developed a preference for one kind of device or other, businesses can find themselves with their data strewn across various formats and networks. Although allowing workers to use their own devices means that there’s no outlay to the business, it does mean that in terms of security your sensitive information is at risk. The ability to work from anywhere may well boost productivity and flexibility but with so many devices and networks being accessed, proprietary and private information could be easily compromised.
Many companies now are adopting a policy known as ‘Choose your own device’ (CYOD). With CYOD the company purchases a range of devices and issues a list of what is available to employees. They can then choose which devices best suit their needs with benefits both from a company and employee perspective.
Here are 10 reasons why it is worth considering a CYOD policy –
- Mobile policy – Whatever your company chooses to do there should be a mobile policy of some sort in place. This should govern usage and access to sensitive company data and gateways.
- Flexibility of use – Generally staff still get to use devices they like and are comfortable with. It also means that with a company device there should only be work information on it so other distractions can be avoided.
- IT control – CYOD means that the company IT department are in control of information security and so different levels of access can be set depending on the employee.
- Security software is present – The IT department can ensure that the correct security software is installed on the devices meaning that private information can remain private.
- Peace of mind – With copious amounts of data travelling outside the office it means that the company can rest assured that encryption and other means of protection is being utilised.
- Security culture – The commencement of a CYOD policy can kick start a process of data security that may not have been evident previously. This can then be adopted or modified for all areas of the business making people focus on the issue.
- Download control – Apps and functions on the device are only those authorised by the company. Anything that may be considered inappropriate can be blocked.
- Password protection – A culture of password protection can also be started using this policy. There are numerous ways in which a methodology of password use may be adopted, setting levels and naming conventions to begin with.
- Lost devices – IT departments can erase sensitive data remotely should a device be lost or stolen. The can also occur if an employee leaves the business.
- Control when the device become obsolete – It is important that any sensitive information be securely disposed of. Hard drives must be physically destroyed to ensure data cannot be recovered. When it comes to the disposal of electronic equipment and data, this where Recycle IT 4 U can help.
RecycleIT4U offer a fast, efficient and friendly service to help recycle your unwanted electrical goods with a simple automated collection system. To book a collection you can either use our online form or you can speak to us direct during our normal office hours. Our collection booking telephone number is 01952 580814.
We will collect redundant PCs, laptops, monitors, servers, network products, printers, EPOS, Scanners, UPS, cabling, AV equipment, projectors, telephones, mobiles and fax machines using our own vehicles at an agreed date and time.
An official WEEE disposal certificate will be issued, quoting serial number, asset tag and description of all the items collected.
Hazardous waste notes will be issued for redundant equipment such as monitors and batteries that contain hazardous materials.
We can also ensure secure data destruction. The security of unwanted data held on file by way of magnetic media, computer hard drives, backup tapes, CD’s or floppy drives is controlled by the Data Protection Act 1998. All data bearing devices are dealt with by Recycle IT 4U in one of two ways:-
- Physical shredding
- Electronic wiping of DATA (only applicable if approved by you the customer)
Data held on hard drives is removed or eradicated using approved software and hardware in accordance with internationally recognised standards.
We also pride ourselves in refurbishing, reusing and recycling for spares and repairs as much as possible, so equipment can have a second lease of life.
Any equipment not suitable for our refurbishment programme or spares, is separated and then sent in bulk to our Strategic Partner, the world’s largest waste management company for further recycling and separation into glass, metal and plastics and reintroduced into the manufacturing chain as raw materials.