by | |

The days of corporate IT departments having complete control over office hardware are over. First, laptops and cell phones began to blur the line between professional and personal communication. Now, tablets and smartphones may erase the distinction altogether. If you're interested in adapting a new mobile device for the workplace, keep in mind how much is at stake if your device is compromised.

According to a report by the technical security firm Symantec, the growing number of cloud computing companies may (at least initially) heighten the risks when using a personal device for business. If your company has recently converted to internet storage, your IT department will have to manage an even more decentralized network, so they'll need your help when it comes to data protection.

First, don't go "off-the-radar" by using cloud computing services to share company information without your employer's knowledge. Your IT department can't assist with an issue if they don't know what services are being used. Additionally, they may have a list of approved applications that they can properly monitor.

Of course, you'd be careful with your own personal information, but take extra precaution if your company's information is involved too. You probably know to be wary of suspicious emails carrying links, but keep in mind that hackers are adapting. Quick Response codes (QRCs), which take your mobile device to a specific link when scanned, can lead to a malware embedded sites, so take the similar precautions when you come across QRCs outside of work.

If you're looking to adapt an EliteBook 2740p Tablet PC or other mobile device to your workplace, review the available accessories and upgrades with a specialist. A technician at PortableOne can also advise you and your company on any issues you may have with cloud computing conversion.

This entry was posted in .