3. Let Them Bring Their Own Technology I'm not sure if you got the memo, but there has been a transformation in technology over the last few years - BYOT (Bring Your Own Technology). Instead of companies dictating which laptops, smartphones, or other devices workers should use, individuals are simply bringing their own technology to work. The initial response by many organizations is to resist the trend. It takes away the relative uniformity, and seems to create chaos when it comes to managing and supporting the environment. However, these are devices that your workers are investing in whether you allow them or not. You can eliminate unnecessary costs for your business by simply inviting workers to use the devices they already own. You could also subsidize split the costs -- a win-win. Aside from cost, BYOT can also boost productivity. These are the platforms and technologies they feel most comfortable with, which is why they invested their own hard-earned money in them. Letting them use them at work rather than forcing them to use something they don't like will make happier, more productive users.
4. Secure Mobile Devices Of course, if you let everyone bring their own laptops, smartphones, and tablets in to work, or connect remotely to company servers and resources, you also need some way to enforce basic security policies, and protect any company data those gadgets might contain. There are cross-platform mobile security tools available to help monitor and maintain security across diverse gadgets and devices. At the very least, you should have a written policy defining basic security requirements. You should also make sure your workers understand the security controls available on the devices they use, and that they take advantage of the protection they already have.
5. Protect Your Data Data breaches seem like a daily occurrence. While some are complex, precision attacks, most are crimes of opportunity. Actually, the reality is that human error and negligence are much more to blame for putting sensitive data at risk than any outside attackers. You should have tools in place on your network that monitor outbound communications to prevent confidential or sensitive data from being leaked -- whether intentional or inadvertent. If nothing else, you need to ensure that all of your sensitive data is encrypted so that it is protected from unauthorized access even if the laptop, smartphone, or tablet it is housed on ends up lost or stolen.