We continue the previous post about Smart Balanced Philosophy.


It is still the employee's phone


The 'bring your own device' (BYOD) trend is expected to surge. Some predictions look at 85% of mobile devices to be personally-owned devices used for work. It means that these phones will have private data, private email accounts and applications. More than this, some of the private applications and data may be used to promote work tasks. What should be done about that? The business should deploy software and management tools to partition private vs. business information and applications; the business should evaluate private applications on their own merits; users should be given a choice but within boundaries; the business should protect itself from time abuses caused by consuming private data and applications while in work; the business should deploy clear payment and reimbursement policies. Another issue to take into consideration is regulation. Make sure to be aligned with state regulations regarding users' privacy.


Rule 4: segregate private vs. business information and applications – logically and time-wise.


Mitigating lost data risk


Data loss comes at a cost. A Ponemon Institute study published in March 2012 found that organizations suffering a data loss paid an average $5.5 million per breach, or $194 per record lost. The end user is often the weakest link on any business network. The greatest data security vulnerability is generated by insiders with privileged access. Negligence is the root cause of the data breaches. Most breaches occur because of employee mistakes and lax operating procedures. Enterprise mobility adds to this risk. The problem can be controlled via executive management getting on board and by providing education. Eliminate the problem by building the mechanisms that block unauthorized data transfers and allowing controlled access to data.


Rule 5: institute training, protocols and tools to control insiders with privileged access.



By Noam Potter

Privacy Preference Center


These cookies are used to guarantee site logged-in to the server and proper site operation.

wordpress_e0e89334ac52a69b56ac8982b9a3784d wordpress_logged_in_e0e89334ac52a69b56ac8982b9a3784d, wp-settings-2, wp-settings-time-2, wpe-auth


These Google cookies are used for re-targeting, optimization, reporting, and attribution of online adverts and remarketing activity.



These third party cookies are used to collect information about how visitors use the site. The information is used to compile reports to improve the site. The cookies collect information in an anonymous form, including the number of visitors to the site, where visitors have come to the site from and the pages they visited.

1P_JAR, APISID, APISID, DSID, DV, HSID, OTZ, __ncuid, _ga, __utmx, __utmxx


Various unique identifiers by Google, which stores your preferred use options.
Google sets a number of cookies on any page that includes a Google product such as Google Map and YouTube. While we have no control over the cookies set by Google, they appear to include a mixture of pieces of information to measure the number and behavior of Google tools users. This may include information that links your visits to our website with your Google account if you are signed in to one. Information about your use of our website, including your IP address, may be transmitted to Google and stored on their servers. These cookies may not identify you personally unless you are logged into Google, in which case it is linked to your Google account.