Tag Archives: BYOD

Where Are My Files

Easy access to files over the Internet is more accessible than ever thanks to the convenience of cloud computing. However, according to Infosec Island, two of the most crucial issues with using a free cloud drive is not knowing where your files are located and who has access to them. With sensitive documents using cloud storage, may not be the best way to go because this method of file sharing and storage iffy in most situations. How do you take advantage of the increasing suitability of web-based storage while maintaining your privacy and file security? Go with an online file sharing program that offers secure file sharing, as well as secure mobile access.

TappIn – Keep sensitive files on your computer and access them from anywhere.

Using Tappin you can access your digital files from a number of platforms including iPhone, Android, Mac and Windows. Additionally, just with any cloud drive, you can access your files from anywhere you have Internet service. So what sets this file storage provider apart from other cloud storage services, such as Dropbox? You do not have to download, sync or copy your files from one device to the next. Additionally your files do not float around in the cloud unprotected. This more reliable system allows you to have immediate access to everything you have in the file sharing system, while maintaining security and professionalism.

Security Concerns

Another bonus with utilizing Tappin for sharing and storing files is the increased security offered by the program. While you can opt to put your files out in the cloud via your 10GB OnTapp account (TappIn Pro version), which is a transitional cloud, you can rest assured that your files will not stay there forever. This feature allows you to store up to 10 GB of files on the OnTapp cloud. An expiration date is placed on the cloud, and once files expire they return to your permanent repository. Since nothing is left out in the cloud indefinitely, you greatly reduce the risk of having hackers steal your important information.

Additionally, you have secure mobile access when using OnTapp. If your mobile device is stolen or broken, you are less likely to have your personal information stolen. You can rest assured knowing that anything stored on the OnTapp cloud will automatically return to your permanent file storage upon its expiration. You can also clear out your files remotely in case of security breaches using this system thanks to the remote file accessibility.

Online file sharing via a cloud drive is no longer the wave of the future. It is the power web users have now harnessed to encourage independence of technology, improved efficiency, and greater accessibility for file maintenance. Keep up with the cloud by choosing a trustworthy and affordable storage system, such as the Dropbox alternative of Tappin, as your file sharing provider.

How to Create Your Own Private Cloud

CREATE YOUR OWN PRIVATE CLOUD WITH SECURE MOBILE ACCESS AND FILE SHARING

TappIn, has partnered with Scale Computing, makers of the HC3 technology platform, the first hyperconverged infrastructure for virtualization and storage. Together, TappIn and Scale now jointly provide secure, mobile access to a complete private cloud environment that is easily managed by IT departments and easily accessed by end-users.

We invite you to learn more about how this partnership can benefit your organization by attending this informational webinar on May 14th: - CLICK HERE TO SIGN UP NOW

IT DIRECTORS WANT TIGHT CONTROL OVER LOCALLY STORED DATA….
yet employees want to access that data from anywhere, any time, and on any device.

With Scale Computing’s HC3 and TappIn, small and midmarket organizations can have both.

TappIn is an Info Security Guides Global Excellence Award winner.  Together with the HC3, TappIn makes it easy for IT Managers to have control AND give necessary endpoint access to locally stored data.

Sign Up for the Webinar Today!

  1. Discover how Scale’s HC3 gives your applications maximum uptime without giving your CFO sticker-shock. It’s roughly 50% less than a comparable VMWare-based architecture and much, much easier to use.
  2. Explore Tappin’s unique feature set and how it makes data stored on the HC3 highly accessible from any device.
  3. Learn how the HC3 and Tappin combination save you time and money while securing your data on-premise and delivering controlled access to your BYOD policies.

A live Q&A session will follow the presentation.

PRESENTERS

Andrew Tull
Vice President of Business Development | TappIn
Andrew Tull acts as Vice President of Business Development for Tappin with primary responsibility for the creation and execution of business development efforts focused on targeted strategic market verticals and accounts. Andrew has over 20 years of experience leading the sales and business development efforts for several organizations in the security-software, technology, and consumer packaged goods industries. He has also been involved in all aspects of account and sales team management, operations, and sales technology for companies that have included Procter + Gamble, Johnson + Johnson, and Net Nanny Software.

Patrick Conte
EVP and GM, Field Operations | Scale Computing
Patrick joined Scale from Azul Systems, where he was the SVP of Worldwide Field Operations. With over 25 years of experience in successfully launching companies into the market from pre-revenue into IPOs and major acquisitions, Patrick has consistently demonstrated strong go-to-market execution and growth strategies.

Alan Conboy
Global Solutions Architect | Scale Computing
Alan is responsible for testing third-party solutions with Scale Computing’s HC3 as part of Scale’s strategic alliance program. He also supports the channel and sales organization as a Systems Engineer. With over 20 years industry experience, Alan is well versed in the needs of the midsize IT generalist.

 

Generation bYod [Infographic]

We’ve crafted this Infographic to illustrate the concerns many IT professionals are currently having about the first generation of BYOD, ‘Generation Y.’ Learn all about BYOD by looking at employees’ attitudes towards it, who exactly are these BYOD’ers, and why BYOD is here to stay.

Generation bYod infographic

Related Posts
BYOD Best Practices – A Guide
Putting Businesses at Risk – The 3 Big IT Problems with Online Storage
BYOD for Back to School – Changing How We Learn Forever

5 Steps to Making Mobile Devices More Secure in BYOD Businesses

TappIn Secure Mobile Devices

We’ve written a lot about the IT risks associated with BYOD (bring your own device) and the need for businesses to design and implement secure BYOD policies, but if we only consider the security of our data when it’s online and don’t give a critical look at the devices employees are using to access that data, then we really haven’t done anything to address the BYOD risks we all face.

Today’s workforce is using their mobile devices as tools to access a wide range of work-related data and information, only adding to the already booming trend that is BYOD.  The BYOD trend has been met with a lot of excitement by employees and businesses owners alike as it allows employees to vastly increase their productivity while using the devices they are most comfortable with.

If you are a BYOD business, odds are you can’t afford to provide each of your employees with a company-issued cell phone. And because you are a BYOD business, your employees will be accessing your data from whatever device is most convenient (often times their mobile devices).  Making those mobile devices as secure and safe to share files remotely through should be considered incredibly important to all businesses (BYOD and other).

Here are five steps every business should take to make sure their employees’ mobile devices are more secure and safe for remote file sharing:

1. Choose mobile devices with advanced security capabilities – Your BYOD policy should include which devices are acceptable to use as well as which devices are not.  Make sure that the devices your employees are choosing to use have advanced security capabilities so you may enable them.

2. Use remote wipe capabilities – In the event that an employee’s phone is lost or stolen, remote wipe capabilities allow a third party to remotely wipe the phone clean of all data.

3. Enable encryption – If the device has an encryption option, make sure that it’s turned on and that your employee keeps it on.

4. Require authentication to access – Create an authentication password for the device so that whoever picks up the device can’t access it without a password.

5. Set up firewalls to designate different levels of access – There are some files and data that you don’t want all of your employees to have access to (especially if they are more sensitive).  You can limit which data employees can access with their own devices by using these firewalls.

And those are the five basic steps to making your mobile device more secure and safe for remote file sharing.  For more information about how TappIn is the perfect app for BYOD businesses, check out these related posts:

Senior Storage Analyst Recommends TappIn in Place of Cloud Storage
Four Mobile Apps that Facilitate Remote Access for Running a Business

BYOD Best Practices – A Guide

As the Bring Your Own Device (BYOD) trend continues to gain traction in schools and most of the today’s global workforce, the IT risks associated with BYOD will continue to grow as well. And as more and more sensitive data is saved in online storage solutions or on people’s personal mobile devices, the need for secure remote and mobile access solutions has become paramount.

And so, to make sure you and your employees are securely accessing files via a mobile device or cloud storage solution, it’s important that you follow some basic BYOD best practices. This guide will share with you four best practices for BYOD in the workforce:

1. Safeguard your content online and off – Making sure that your wireless connection is protected, that you have optimized your online accounts for maximum security, and that you are only visiting secure websites are a few basic steps that anyone can take to help keep the devices you use (to remotely access your files and sensitive data) safe and secure.

 2. Provide tools anyone can use – No matter how big or small your business is, you undoubtedly will have employees with varying degrees of tech-savvy-ness. To make sure all of your employees are following the same BYOD best practices, you need to make sure that for whatever needs they have (sending large files, online collaboration, video sharing, etc.), you provide them with a tool/service that even your least techy person can be comfortable using.

3. Make sure employees that are leaving aren’t taking your sensitive data with them – if your company encourages its employees to use their mobile devices to increase productivity, it’s critical that you come up with a plan for if/when those employees leave. BYOD is already risky, but once you throw in a terminated employee, the risks are much greater.

4. Design and implement an effective and secure BYOD policy – Much like a best practices guide, your BYOD policy should be available to all of your employees and it should clearly indicate how they should use their personal devices in conjunction with work materials. Make sure that your BYOD policy is clear and easy to understand and that your employees both understand and agree to adhere to the rules put in place in your policy.

Ideally, you want to find a service or tool that is able to take the guess-work out of whether or not your employees are adhering to BYOD best practices.

That’s where TappIn comes in. With TappIn, your content isn’t being saved in or synced to an online storage device, and instead can remain safe on your computer or NAS. With TappIn, you can choose who you want to share your files with, as well as remove access from former employees. And because TappIn is extremely easy to use, even your least techy employees can use it.

Try TappIn Pro FREE for 30 days and see for yourself how TappIn helps make BYOD less risky.

Putting Businesses at Risk – The 3 Big IT Problems with Online Storage

The world’s workforce has changed drastically over the past few years with the advent of the internet and mobile technologies. Tools, services, and programs that enable people to store data online and help facilitate online collaboration are becoming more and more popular as more people join the BYOD (bring your own device) movement.

However, using these tools, services, and programs like the Cloud and Dropbox, that facilitate both online storage as well as online collaboration, has proven a major problem for many businesses’ IT departments. The primary role of the IT department in any business is to protect the digital content, data, files, ideas, etc. that belong to the business from cyber security threats.

The three biggest problems for IT departments whose employees use online storage are that:

1. Employees Choose Programs Differently than IT Departments

Employees usually adopt and use programs that are A. easy-to-use and B. inexpensive, and they don’t usually consider the security threats associated with using that program. IT departments choose programs that are first and foremost secure.

 2. Employees Don’t Ask Permission

Many employees using these online storage and online collaboration programs don’t seek any permission or clearance from their superiors or IT department before they decide to use the program. How can an IT department keep sensitive data protected when they don’t know where it is being saved?

 3. Employees Often Don’t Set the Right Privacy Settings

Because it is often the employee who decides which program they will use and not a member of the IT department, many employees using these programs don’t know how to set the proper security settings. Businesses don’t necessarily have to stop the use of these programs altogether, but if they do use them, the IT department should be in charge of setting the proper security settings for employees.

 

Related

Figure out how to design and implement an effective BYOD policy
Learn more about the risks of BYOD
Find out why this senior storage analyst chose TappIn over cloud storage

 

BYOD for Back to School – Changing How We Learn Forever

By enabling people to work from anywhere, at any time, from any personal or mobile device, the BYOD trend has already changed the way we work forever. But the BYOD trend isn’t only having an effect on the workforce. Recently, this trend has been changing how the next generation of workers (students) learn.

It’s true that there are risks with BYOD in the workplace, so why is BYOD all of a sudden the “Big man on campus”?

BYOD Voted“Most Popular”

The benefits of BYOD are too many to list here, but needless to say allowing students to bring their own device to school enables them to learn in the way they feel most comfortable.  For example, some students find it easier and more efficient to take notes in class on their computer or personal mobile device than using pen and paper.

However, BYOD’s popularity isn’t just limited to the classroom.  The devices students bring to class grant them online access to a wealth of information that cannot be contained in a single textbook.

BYOD Now #1 on Back-to-School Shopping Lists

School supply shopping used to consist of shopping for paper, pens, pencils, books, etc.  However, with BYOD, students have all of those supplies in one device.  And because your device won’t run out of ink or paper, you don’t have to continue buying supplies throughout the year.  And since students can purchase texts online, BYOD also gets rid of the need for teachers to provide, and students to haul around, heavy textbooks.

The devices students bring to class can execute a number of actions that school supplies of yesterday are incapable of executing.

Never Forget Your Homework Again with BYOD

With apps like TappIn, which allow you to remotely access your data wherever it’s saved and from any device, the BYOD trend has made it much harder for students to forget their homework (sorry, guys!).Once students save their work on their own device, they don’t have to move or save it anywhere else to share their homework with their teachers.

As more teachers use the internet to communicate with their students by posting assignments and homework online, having access to the internet, as well as your work wherever it’s saved, will become more and more important.

BYOD Helps Make Learning More Fun

Teachers are always looking for new and improved ways to teach material.As lesson plans begin to incorporate more forms of media and technology to make them more interesting for the next generation of students, students will need to be able to view those digital materials with some sort of device.If students are able to bring their own devices to class they will be able to access and experience those materials right away.

Related
Try TappIn for 30 days for FREE
Learn why people are choosing TappIn over other online storage solutions
Find online collaboration tools to help you work from anywhere

 

BYOD – 3 Risks Vs. 3 Rewards

risks and rewards of bringing your own device to work

BYOD, the acronym for Bring Your Own Device, is a movement that has experienced significant growth over the past few years — a boom only made possible with the growing popularity of laptops and other mobile devices.

But what exactly are the risks and rewards associated with this new way of doing business? Here are the top 3 risks and rewards of BYOD as we see them.

Risks

 

1. IT Security

As we mentioned in our previous blog post, Top 4 BYOD Challenges for Small and Midsize Businesses, implementing an effective and secure BYOD policy BEFORE you allow your employees to bring their own device to work is incredibly important. With a policy of rules in place, employees are better able to find safe and secure ways to remotely access their more sensitive data.

2. Control

While BYOD gives a lot of control to workers in that it enables them to work on their own devices in a way that suits them best, a lot of control is being given up by business owners and their IT departments.

3. Compliance and Ownership

Some industries (usually healthcare and financial institutions) have compliance mandates (like HIPAA, and GLBA) that require that data have certain safeguards and security settings in them to make sharing and accessing them more secure.

If you are providing your own equipment for your employees to work on, then you can set rules so that these mandates are easily complied with. If employees are accessing that data from their own personal devices without those safeguards in place, they run the risk of exposing sensitive data to hidden threats.

Rewards

 

1. User Familiarity = Productivity

One of the benefits of employees bringing their own devices to work is that they are usually familiar with the equipment they choose to use. Some employees work better on laptops, some work better with iPads, some work better on Apple computers, and some work better on PCs; studies have shown people are more productive using their own devices.

2. Equipment

The costs of equipment start to increase exponentially when you add in the costs of maintaining that equipment. With BYOD, you are not responsible for buying or maintaining the equipment your employees are using, and so the costs fall on them instead of on your business.

3. Cost

Providing equipment (computers, monitors, keyboards, etc.) for all of your workers can get very expensive very quickly. Saving money on office costs is one of the major reasons BYOD has become so popular. However, many experts are starting to say that BYOD will actually end up costing the employers more in the long run. Soon this may be a risk instead of a reward.

What do you think? Is BYOD something you already do? Are there are any risks or rewards that we missed?

4 Mobile Apps that Facilitate Remote Access for Running a Business

Over 30 billion apps have been downloaded in the last year alone. But how many of these apps should businesses seriously use?

The four most important aspects of working remotely or from a mobile device are: secure access, easy communication, efficient expense tracking, and the actual doing of work on your phone or mobile device.

Here are 4 mobile apps that facilitate remote access for running a business:

1. For Accessing your Data Remotely – TappIn

Whether you use Cloud storage, Dropbox, Sugarsync, TappIn allows you to access your data (wherever it’s saved) from any mobile device at any time.  TappIn is the best solution for securely and remotely accessing your data.

2. For keeping in touch and telecommuting – GoToMeeting

Never miss another meeting again!  This allows users to participate in meetings via their mobile device.  Not only does it allow you to verbally communicate with other people attending the meeting, but it also allows you to see charts and graphs that are being shown at the meeting.

3. For keeping track of your expenses on the go – Expensify

Having trouble keeping track of business expenses?  Expensify’s SmartScan works with your phone by taking a picture of receipts of business expenses (recording the date, time, amount, etc.) and organizing that information within the app by syncing your bank accounts and credit cards to keep clearer track of spending.

4. For doing work – FormMobi

Also known as the digital clipboard, this app makes it easy for people in the field (away from a computer/office) to design and fill out customized forms.  A great app for a wide range of other professions, because it allows users to share multimedia style (including video, pictures, and graphs in your customized reports/forms) information with clients and coworkers.

Do you use any of these?