Kazmarek

Free Site Analysis 1-858-952-5400
REMOTE ASSISTANCE
  • Home
  • OnGoing Management
  • IT Services
    • Microsoft 365, Exchange Services, and Consulting
    • Cloud Solutions
    • Virtualization
    • Mobility
    • Backup & Disaster Recovery
    • Server Installation/Migration
    • VoIP
    • Network & System Administration
    • Additional Solutions
  • Why Kazmarek
    • Case Studies
    • Testimonials
    • KTS Values
  • For Clients
    • O365 Log In
    • Client Portal
    • KTS Documents
    • SonicWALL VPN Client
  • News
    • Newsletters
  • Who We Are
    • Company
    • Team
    • KTS E-Award Winners
    • KTS Values
    • Charities We Support
  • Contact Us
    • Contact Us
    • Careers

Issue No. 19February 2014

B.Y.O.D.

What is it? and What are the Risks? 

B.Y.O.D. – Bring Your Own Device

B.Y.O.D. is the idea of allowing employees to use their own laptops, smartphones, tablets, or other devices in a work environment.  Instead of the IT department mandating specific hardware, users are free to use the platforms and gadgets they prefer. 

Risks – What you should know

The risks associated with allowing users to bring their own computers or mobile devices into the work environment will vary depending on geographic region, the industry the company works in, and even the specific job role within a company.

 Businesses that operate in specific industries, like healthcare or finance, fall under strict regulatory compliance mandates. SOX, HIPAA, GLBA, PCI-DSS, and other compliance frameworks outline which data must be protected, and provide basic guidelines for how that data should be protected. The obligation to comply with these directives does not change just because the data is moved from company-owned equipment to employee-owned devices.

 There are frequent reports of sensitive customer or employee data being potentially compromised as a result of a laptop being taken from an unlocked car, or company data being compromised by an employee leaving a smartphone in a taxi.

 The challenges of B.Y.O.D. are not necessarily a reason to ban the practice altogether, though. The trend has significant momentum, and there are a number of benefits for both companies and users. The trick is for both to understand the advantages, as well as the potential risks

For more information regarding B.Y.O.D., Contact Us.

MYTH: Mac’s Don’t get Viruses

TRUTH: Mac Devices are capable of getting a virus.

 A computer virus is anything that infects your computer and causes it to do something that you do not want it to do, or something that divulges private information to unintended parties.

 The popularity of Apple computers, iPads and iPhones has led to explosive growth of their use in business environments. In turn valuable company data is being stored on and accessed by these devices. This situation has given virus programmers and computer hackers great motivation to attache the Mac and iOS software, and this trend will only continue as their popularity grows. 

 Proof

In 2012 the Flashback Trojan malware infected an estimated 600,000 Macs by appearing to be a browser plug-in, when in actuality the Flashback Trojan was designed to steal personal information. In 2013 Macs operated by Apple employees were infected with Java-related malware when they visited a software development website. As for 2014, there is a Digitally signed data-stealing malware that is targeting Mac users. Scammers are sending emails of “undelivered courier items” and when you click on the link – you are infected.

 Anti-virus Protection

Viruses can attack your computers and devices in more ways than one. Internet browsing, email, IM applications, USB drives and networks are many of the ways that a virus can enter your computer. 

It is very important that even Mac users install Anti-virus software to protect their computers and devices from viruses, spyware, identity theft, and spam. 

 Fore more information regarding Anti-virus protections for your computers and/or devices please Contact Us.

 KTS Employs Apple Certified Pros!

                           Apple

Testimonials

Testimonials

“We’re building a solid IT foundation to be able to go where we need to be for growth and success. I couldn’t be more pleased with KTS’s performance and progress on our IT Projects.”

Shawn Ellis, CFO Custom Logos

Testimonials

“Both company email migrations have were completed without a problem. Thanks to your team both transitions went smooth.Everyone with your group are both knowledgeable and professional, and you should be proud of the organization you are building.”

John Sonnen, IT & Security Director Child Safety Network

Testimonials

“We have been using KTS for our IT support for about a year now, and we are very pleased with the service we have received. Chris has been our first line person, and has been able to resolve issues quickly, and often remotely, which helps reduce costs. Our staff has really appreciated his fast response and resolution to the issues that have come up. We have also appreciated that there are other folks at KTS who can fill in if Chris is out. Thanks to all!”

Suzy Halleland, Executive Administrator Village Church

Testimonials

“I think you know we have been very happy with your service and are very grateful to have been referred to you guys. But on a more personal note, I want you to know that Kevin in your office has provided a service for us that is way over the top.”

Jeff Golumbuk, CEO Custom Logos

Testimonials

“I just wanted to thank you and your staff for the excellent service and work provided by KTS.  It has been night and day compared to our old third party IT consultant.”
Nick Walters, VP Project Management West Coast General Corp.

Testimonials

“I wanted to let you know that I am absolutely delighted with the service we have received from you and your team so far. I know we put you in a tough position with such short notice of having to jump in and take over, and we really appreciated that. But there are many other reasons as well. First, I’m so glad they discovered the hard drive problem right away, as that could have caused us a huge issue as you well know. Second, everyone that I’ve had the pleasure to work wi… Read more
Jo Barsa, CPA Barsa & Company

Testimonials

“Kazmarek is fantastic!  I’ve used every size of IT company over the past 20 years and Kazmarek is by far superior to all I’ve used.  We are extremely happy with their service and expertise.  One of the things I like most about them is that they have engineers available to respond to our prioritized needs but they also wanted to give us the best customer service possible so they went above and beyond and put in place an escalation plan so that if I feel the response time i… Read more
Marisa Janine-Page, Partner Caldarelli Hejmanowski Page & Leer LLP

Testimonials

“I have thoroughly enjoyed working with the Kazmarek team through the years! They are responsive and have a great team to work with, whether it’s day-to-day IT needs or special projects. ”
KC Martin, HR Director Full Swing Golf

Testimonials

“As a local San Diego business, we were looking to partner with another local business after our IT needs just weren’t being met with a nationwide provider. We could not be happier with our decision since KTS has been very swift, attentive, and collaborative with our IT needs over the past three years. Their engineers, support desk, and managers are patient and able to effectively communicate issues and solutions to a layperson which speaks volumes about their hiring and customer… Read more
Carrie Lamb, Project Manager Chuao Chocolatier

When Was Your Last Backup?

When Was Your Last Backup?

If you don’t know, you’re not alone.
Find out more

Join Our Newsletter

Join Our Newsletter

Free On-Site Analysis

Free On-Site Analysis

Contact us to receive a 1-hour complimentary evaluation.
Learn more here.
  • This field is for validation purposes and should be left unchanged.

Copyrights: © 2023 Kazmarek. All rights reserved.

Designed by TinyFrog & N Halie Designs