Search results for: "BYOD"

Conference materials BYOD: (B)rought (Y)our (O)wn (D)estruction?

BYOD: (B)rought (Y)our (O)wn (D)estruction?

Presented at the Virus Bulletin 2012 conference in September, this paper considers the pros and cons of the BYOD trend, potential attack vectors, and advice on countermeasures. First published in Virus Bulletin 2012 Conference Proceedings*

BYOD Infographic: For security it's not a pretty picture

The phenomenon of organizations allowing or encouraging their employees to use their own computing devices for work–known as Bring Your Own Device, or BYOD–is now widespread in many countries, bringing with it some serious risks to company networks and data. As we first reported here on the blog a few weeks ago, ESET commissioned a