First Reference company logo

Inside Internal Controls

News and discussion on implementing risk management

machine cogs image

internet access

Is it really possible to control employees’ use of company computers?

Policies can help you manage employees’ and others’ use of company IT resources, and dramatically reduce the potential risk to you and your assets.

 

, , , , , , , , , , , , , , , , ,

BYOD: Bring your own device is a growing business trend

iphone-ipad-bring-your-own-device

Since well before Information Technology PolicyPro was first published and for good reasons considering the technologies available at the time, it made sense to restrict devices connected to the corporate network to those owned and controlled by the enterprise and configured by IT. This is no longer the case.

 

, , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , ,