Sponsor Robert Siciliano as he runs the Boston Marathon for Miles for Miracles, Children's Hospital Boston
ROBERT SICILIANO, CEO of www.IDTheftSecurity.com is fiercely committed to informing, educating, and empowering Americans so they can be protected from violence and crime in the physical and virtual worlds.


Check here if you're human


Advisory Boards

IT Security – Get a BYOD Policy Now!

Pin It

Your companies IT person is tasked with managing numerous digital devices like mobile phones, tablets and any other portable device that communicates. Small businesses and IT managers must have IT security policies to manage devices attached to the network. Start looking at security vendors who provide solutions to keep track of, lock down, and secure your small business devices.

Consumers have at best a basic knowledge of IT. Consumers like gadgets and want to know how they work and at work they need to use technology to use it. This process is how the majority gets up to speed on technology and learn personal technologies they acquired for home use to make their work lives better than even the technology their workplace provides them. This is the consumerization of IT.

The issues of “BYOD” or Bring Your Own Device to work is a huge problem for IT managers at small businesses everywhere. Most IT managers have a pretty good handle on the company laptops desktops, and mobiles, but they are quickly losing control when employees bring their new Android mobile device and connect it to the corporate network.  Now they have to worry if that last application that was downloaded is infected and will infect the network when plugged you into a company PC to update or sync something.

Help the IT manager protect your small business network by:

  • Check to see if your business has a BYOD policy
  • Lock down your mobile device in case it’s lost or stolen
  • Install a “lost/locate/wipe” software on your device
  • Never leave your device exposed/unattended in an automobile.

 Robert Siciliano personal and small business security specialist toADT Small Business Security discussing ADT Pulse on Fox News. Disclosures


About the Author
ROBERT SICILIANO, CEO of IDTheftSecurity.com is fiercely committed to informing, educating, and empowering Americans so they can be protected from violence and crime in the physical and virtual worlds. His "tell it like it is" style is sought after by major media outlets, executives in the C-Suite of leading corporations, meeting planners, and community leaders to get the straight talk they need to stay safe in a world in which physical and virtual crime is commonplace. Siciliano is accessible, real, professional, and ready to weigh in and comment at a moment's notice on breaking news.

Similar Posts

  • 4 Best Practices for BYOD Policies
    People love their mobile devices and don’t want to leave home without them. When they bring their digital device to work we call this Bring Your Own Device or BYOD.  The day after you get your new mobile phone or iPad, you’ll probably take it to work and have the IT department set it up
  • “BYOD”? Mobile Security Tips for Small Businesses
    Many employees have come to expect that they should be able to use personal smartphones and other mobile devices at the office. This creates problems for IT managers. A company’s IT staff may have a solid grasp on company-issued laptops, desktops, and even mobile phones, but it is almost impossible to control the results when
  • Mobile Device Security in a BYOD World
    In the real world there is little difference between an employer’s issued device and a personal mobile device. The most important difference should be that a digital device issued by your employer requires and should have a “company mobile liability policy”. Businesses generally provide and pay for employee mobile devices, and also strictly dictate what
  • Mobile Security: Tips for Using Personal Devices at Work
    Businesses in all forms operate under numerous business regulations. Small businesses such as finance healthcare, or one where a fine might be imposed if a data breach occurred need to recognize mobile security as a fundamental layer of yours or your company’s information security process. Mobiles are smartphones and used for ecommerce for consumers and they
  • What are the risks of BYOD?
    As companies cut costs, and employees desire more freedom of choice, they increasinglybring their own mobile  devices to work. . The opportunity to eliminate the significant expenses associated with corporate mobile devices excites even the most staid CFO, and the IT guys are told to “make it work.” This development has come to be known

Leave a Comment

You must be logged in to post a comment.

Xtreme School

Featured in

Anderson Cooper John Stossel Robert Siciliano Featured in
Browse by Month

Browse by Category