Even if your organization hasn't formally adopted a BYOD approach to technology, you know that trying to control the proliferation of employee-owned devices in the workplace is challenging.
Formal BYOD approaches require a lot of work beforehand and a commitment to policy creation and security. Some companies take this lightly and find themselves unprepared for security breaches. If your organization was one of these, we'd like to hear from you.
You can keep the name of the organization private but we'd like to hear some "horror" stories that resulted from BYOD mismanagement, along with some lessons you learned in hindsight and how you would do things differently. It's our goal to provide best practices for our audience and this is one of the best ways we can do that. If we feature your story in the piece, we'll send you a TechRepublic coffee mug.
Please send your stories to me at email@example.com.
About Toni Bowers
Toni Bowers is Managing Editor of TechRepublic and is the award-winning blogger of the Career Management blog. She has edited newsletters, books, and web sites pertaining to software, IT career, and IT management issues.