It’s never been more important for businesses to guard against security breaches. From sophisticated, targeted intrusions by hackers to device theft, they face a barrage of threats to their devices and data. In 2014, for example, the theft of devices from Coca-Cola’s Atlanta headquarters involved the breach of unencrypted personal information relating to 74,000 employees, including Social Security numbers and details about financial compensation. In large organizations, where people are constantly coming and going, such thefts are practically unavoidable, and any solution needs to be based on a combination of staff training and intelligent security measures. With mobility and trends such as BYOD dominating the IT agenda, we wanted to look at three areas where Kensington are working with enterprise to deliver effective security policies.

Point of Sale Systems

Tablet and cloud computing have delivered businesses with Point of Sales systems (POD) capable of driving real growth. Staff and sales teams can use iPads and other tablet devices to access all of their data from anywhere they happen to be, while the POS system can be joined up with other parts of the business, allowing for better customer service, more efficient stocktaking, and real-time analysis. Kensington’s SecureBack range allows businesses using tablets for POS to do so more securely, since each case comes with a ClickSafe lock slot and allows for integrated protection of the card reader.

Contactless_Image3

Hot-Desking

Journalists have been talking about the move away from the traditional nine-to-five office where every employee has her own desk for a long time. After the recession in 2008 companies were looking to save money wherever and whenever they could, and office space was one area that came sharply into focus. The rise of hot-desking, which lets businesses cut down on floor space and create a flexible workplace that reflects their employees’ workflows, has been something that IT departments have had to adapt to. Whether this involves the provision of additional screens, docking stations or peripherals, it’s important that business can protect their investment from loss and theft. Desktop and peripherals locking kits from Kensington allow organizations to secure IT equipment such as docking stations and monitors at hot-desks and temporary workstations, enabling employees to work efficiently and productively.

Contactless_Image2

BYOD

BYOD has now moved well beyond the novelty of bringing iPhone to work, growing into a serious security and productivity issue for enterprise and IT. While some advocates see it as the key to maintaining a productive and satisfied workforce, others in IT departments tend to see it as the “the weakest link in the security chain”. From staff training to effective MDM policies, there are a number of ways firms can mitigate the security risks involved in BYOD. In a workplace where staff are using their own devices and face a risk of theft and loss, promoting the use of a portable laptop lock can significantly reduce the possibility of a breach.

Which IT trends are going to have the biggest impact on your security policies in 2016? Let us know your thoughts by commenting below or via LinkedIn.