Blog
  • Register

Subscribe to our blog

CTN Blog

CTN Solutions has been serving the greater Philadelphia area since 1997, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Policies that Every BYOD Strategy Needs to Abide By

Policies that Every BYOD Strategy Needs to Abide By

One of the most effective means for a business to shave a few dollars off its budget (and potentially boost employee engagement, for that matter) is to adopt something called a Bring Your Own Device policy—effectively, an agreement that allows their team members to access business-owned documents and files on devices they personally own to get their work done. While these policies have been shown to be very effective, they also need to be carefully considered so they can be adopted appropriately.

0 Comments
0 Comments
Continue reading

Tip of the Week: Better Understand BYOD

Tip of the Week: Better Understand BYOD

There are a lot of benefits to implementing a Bring Your Own Device policy for your business. First, people can use the devices that they’ve purchased, and have grown accustomed to, for work. Moreover, many times they can access company information with easy-to-use mobile apps, providing more opportunities to be productive. In fact, many organizations that install a BYOD policy see the majority of their workforce work more, which creates more opportunities for revenue growth, and ultimately, higher profitability.

0 Comments
0 Comments
Continue reading

BYOD is Only Helpful If the Devices Are Secure

BYOD is Only Helpful If the Devices Are Secure

Mobile devices are so common nowadays that your employees will bring multiple devices to the office on a regular basis. Little do they know that everything they bring with them, from their Fitbit to their laptop, poses a security threat. Of course, the threat level depends on each individual device type. But the point stands that the less you do about mobile device security now, the more danger your organization will be in, down the road.


There is a very simple rule that you can use to gauge how vulnerable your business infrastructure is to mobile devices. The more devices that have access to a network and its contents, the more likely it is that you’ll be putting it in danger. If you aren’t careful about which information is accessed by certain users and devices, then you could expose your business to considerable risk. Therefore, it’s critical that you put measures into place before the worst happens.

It all starts by implementing a Bring Your Own Device (BYOD) strategy, which aims to improve the way that your business manages mobile devices without sacrificing data security in the process. Here are some of the most common features of a BYOD policy:

Blacklisting and Whitelisting Apps
Any apps that you download to your device have to be secure. Generally speaking, most apps that you will download should be safe for your company to use, but there are others out there that have only malicious intentions. Naturally, you’ll want your devices to be equipped with whitelisting and blacklisting capabilities so that you can control what types of apps are found on company devices. The theory here is that you can prevent hacking attacks and data leaks by preventing malicious apps from installing on the devices in the first place.

Remote Wiping
What happens when a device is lost? You might have a lot to worry about, or you might not. It depends on where the device has been lost. If you misplaced it in your office or home, perhaps you can locate it. If you leave it on the train, there’s no telling who will find it. Perhaps a good Samaritan will return the device, but chances are that it will be exploited by its new owner, be it someone who just wants a new device, or a hacker intent on stealing as much data from the device as possible. Remotely wiping the device allows you to maintain the integrity of your infrastructure and its data, even in a worst-case scenario.

A BYOD policy is an incredibly important aspect of a modern technology infrastructure. Do you have one? CTN can help you implement all of the best solutions to secure your mobile devices. To learn more, reach out to us at (610) 828-5500.

0 Comments
0 Comments
Continue reading

Is Your BYOD Strategy Up to Standards?

Is Your BYOD Strategy Up to Standards?

BYOD, or Bring Your Own Device, policies have proven to be a highly effective way for companies to save money. However, these policies need to address some of the shortcomings, potential costs, and security concerns that come with employees bringing and using their own devices.


Committing Time to Mobile Device Management
Mobile Device Management, or MDM, needs to be involved whenever there’s a BYOD implementation. There needs to be a designated contact in your organization to monitor your MDM software to ensure that your data isn’t being accessed by someone lacking the authorization to do so.

Unfortunately, this is often easier said than done. Monitoring your MDM solution can very quickly become a full-time task. Before you commit to a BYOD strategy, establish if you can spare the resources to properly maintain it.

Obtaining Support
If a company provides their workforce with devices, then the company has control. The company can select a certain build of machine and standardize the company systems. This means that IT only has to know how to handle one or two types of machine, allowing them to do a better, faster job taking care of your systems.

BYOD can often make obtaining support more difficult and time-consuming, and thereby less cost-effective. This is because you suddenly have to contend with numerous kinds of devices and the various issues each can present. As a result, providing uniform company devices could ultimately total out to be less expensive than allowing employees to use their own, depending on the abilities of your employees.

Waste
We’ve all been there--we get something, determined to use it, and yet it is never used for its intended purpose. This phenomenon can be seen in many cases of BYOD implementation. An employee will be approved for BYOD--whether or not their duties would be benefitted by their using their own device in the first place--and never use it for work. As a result, their employer more or less begins to pay for the employee’s personal device.

Lack of Control
It wasn’t long ago that Apple released iOS 11, which came with a new ‘feature’ that could more accurately be called a vulnerability. The device’s control center provides an on and off switch for Bluetooth and Wi-Fi. However, it turns out that these switches don’t actually turn either off, opening a user to attack. Therefore, using a device with iOS 11 installed could leave your business vulnerable if it is part of a BYOD implementation.

Now, we aren’t saying that you shouldn’t utilize BYOD. We just want to make sure you are prepared to mitigate these concerns and get the most benefit out of your Bring Your Own Device policy. We can help make sure that you are prepared. Call CTN Solutions today at (610) 828-5500.

0 Comments
0 Comments
Continue reading

Increased Mobile Device Use Means Increased Risk for Businesses

Increased Mobile Device Use Means Increased Risk for Businesses

Smartphones, laptops, and Chromebooks empower today’s workforce to be more mobile, and employees are often the driving force behind this. Chances are, if your business hasn’t even begun to think about your mobile IT strategy, a percentage of your staff already has.


Last year, Gartner conducted a huge survey that concludes just that. Here are the stats:

  • 8 in 10 of employees bring their personal mobile device to work.
  • 37% of employees receive laptops from their employer.
  • Only 23% of employees surveyed were given corporate-issued smartphones.
  • Yet, 10% of employees given a work device don’t use personal devices as well.
  • That said, only 20% of all employees who were given a work device were dissatisfied with it. Typically the satisfaction level is higher with smartphones compared to desktops and laptops.
  • More than 50% of all employees who use smartphones for work use their personal device.
  • 2/3 of employees use a personal device, whether it is a smartphone, tablet, or laptop, for work.

So what does all of this have to do with your data? Employers have worked hard to protect and centralize company information, and control access to files and email. Once employees add personal mobile devices to the mix, it adds a whole new layer of complexity. 

So Really, What Are the Risks of Personal Devices?
If left unchecked, there are plenty of risks. This is why employers go to such drastic lengths to try and control mobile device use in the workplace; or, even prevent it altogether.

A lost smartphone or tablet could give someone access to company email, which might include sensitive client information, processes, passwords, and a whole lot of other data. A personal laptop that gets hacked or infected could bring the same risks, while spreading the infection onto your network. If an employee uses public Wi-Fi, even a novice could muscle their way into the data and get passwords, correspondence, and other information.

Even worse, if a disgruntled employee quits, they could have access to your contact lists, files, and everything else they had while employed. The trouble they can cause could keep you busy for a long time.

Let CTN Help Devise your BYOD Strategy
A BYOD (Bring Your Own Device) strategy, also known as a mobile device management strategy, will protect your company’s data, as well as allow employees to take advantage of mobile devices and the many benefits they can bring to an organization. By crafting a thoughtful, well-documented plan for what’s allowed, what needs to be done, and what’s at stake, you can keep business moving quickly without hindering employees or your data. Plus, many of the key elements of a BYOD policy can drive even more innovation and collaboration.

Let’s talk about it. Give us a call at (610) 828-5500 and ask how we can protect your data while keeping your business mobile.

0 Comments
0 Comments
Continue reading

3 Considerations Every Business Owner Must Make When Implementing a BYOD Policy

3 Considerations Every Business Owner Must Make When Implementing a BYOD Policy

Bring Your Own Device, or BYOD, has become an accepted practice in the workplace, but only when it’s implemented properly. The fact remains that allowing workers to use their personal devices for work purposes has its benefits and disadvantages, and that you should only allow them to do so after they adhere to your company’s BYOD policy. Of course, this assumes that you actually have a policy, so let’s talk about how to set up a quality BYOD policy.

0 Comments
0 Comments
Continue reading

Be Sure to Consider the Pros and Cons of Allowing Personal Devices in the Workplace

Be Sure to Consider the Pros and Cons of Allowing Personal Devices in the Workplace

Bring Your Own Device, or BYOD, has grown significantly in the business environment. You might even have a couple practitioners of BYOD in your own office; people who use their personally-owned devices for work purposes. However, just like any potential benefit, it also has drawbacks that need to be considered. How can you implement BYOD without experiencing too many of its drawbacks?

0 Comments
0 Comments
Continue reading

How to Leverage the Benefits of Mobile Devices While Negating the Associated Risks

b2ap3_thumbnail_bring_YOD_400.jpgMobile devices have taken the workplace environment by storm, and you’d be hard-pressed to find anyone who doesn’t use their smartphone, laptop, or other device for work purposes. This trend, called Bring Your Own Device (BYOD), helps employers spend less on new solutions, but it also presents a risk that needs to be managed: the Internet of Things (IoT).

0 Comments
0 Comments
Continue reading

Mobility: Three Trends to Understand

b2ap3_thumbnail_mobile_for_your_business_400.jpg

There are three trends shaping the way that organizations handle modern mobile device management.

Bring Your Own Device (BYOD)
Perhaps the biggest influence is the fact that employees are bringing their mobile devices to the office. In fact, some employees may prefer to use their own personal devices for work rather than the workstations provided by your organization. Indeed, when faced with a technology issue employees are more likely to insure their own personal devices are working properly.
0 Comments
0 Comments
Continue reading

Unfamiliar with BYOD? Here’s Where to Begin

b2ap3_thumbnail_bring_your_own_dvice_to_work_400.jpgA trend that’s taking the office by storm is BYOD, or Bring Your Own Device. These policies entail workers bringing their own devices to the office and using them for work-related purposes. While this opens up many avenues for enhanced productivity and efficiency, being too laissez faire with your BYOD policy could instigate some problems later on, primarily in the security field.

0 Comments
0 Comments
Continue reading

Mobile? Grab this Article!

QR Code

Latest News & Events

CTN does not use any SolarWinds or FireEye products. As you’ve likely seen reported, SolarWinds discovered a supply chain attack compromising their Orion business software updates that distributed malware known as SUNBURST. The malware perm...

Latest Blog

Of all the cybersecurity considerations a modern business has to make, defense against phishing has to be at the top of any cybersecurity strategy. Let’s take a look at phishing and why it’s such a big problem for your business. ...

Contact Us

Learn more about what CTN can do for your business.

Call us today
(610) 828-5500

610 Sentry Parkway
Suite 110
Blue Bell, Pennsylvania 19422