Intelligent CIO Africa Issue 54 | Page 69

t cht lk

t cht lk

Protections
If educating staff fails , there are some protections IT teams can manually put in place to mitigate risk even further .
• Constant software updates – if employees opt to use their devices for work purposes , this has to be under the precedent that the phone is updated regularly . Be sure to provide employees with the support necessary to deliver these updates
• Password security – to minimise security risks , roll out a compulsory monthly password change . Also ensure that you are putting up restrictions around the type of passwords employees are using , making it less obvious to potential hackers
• Encrypt data for protection – smartphones and tablets have encryption options that will provide protection of storage . Smartphones that are encrypted have a lower risk of being hacked
• Clear all phone data – if employees decide to move on to a new device or stop using their current device , ensure you manage the deletion of all data from that phone and a strict policy around discarding devices .
As work from home has become the new normal this year , it is becoming increasingly complicated to manage the sprawl of a company ’ s data . While these agile work trends had been predicted for the next 5-10 years , organisations were not prepared for them
to become so mainstream in 2021 . As we look to the future , this is only going to become more and more complicated .
It ’ s important for IT teams to understand all the risks as their companies take on more flexible working arrangements in the new future . A huge part of this is of course understanding the risks that come with using personal devices , particularly in the process of discarding them or sending them to a new home . p
Rick Vanover Senior Director Product Strategy , Veeam
www . intelligentcio . com INTELLIGENTCIO AFRICA 69