Intelligent CIO Africa Issue 54 | Page 68

t cht lk and so protecting the data on it becomes a challenge . Things like a lack of encryption or outdated operating systems can lead to potential hacks and data loss .

t cht lk and so protecting the data on it becomes a challenge . Things like a lack of encryption or outdated operating systems can lead to potential hacks and data loss .

This is something organisations need to consider when implementing a cyber security strategy . This means educating staff in understanding the risks involved with discarding old devices and setting up the right protections within an organisation .
The first step in managing this is for IT teams to educate employees about the risks involved with using personal devices for work purposes and then eventually discarding it .
Educating staff
The first step in managing this is for IT teams to educate employees about the risks involved with using personal devices for work purposes and then eventually discarding it . Employees should be trained in the security practices of an organisation and also understand how that translates to personal devices .
Part of this should be educating staff on how to properly wipe the contents of their phones if they eventually discard it to a second-hand store . This is not something that is considered by most organisations .
Employees also need to be briefed to understand how to identify potential malware , phishing , or ransomware attacks on their personal devices . If employees are able to identify these threats , it mitigates risk of data being lost at all .
68 INTELLIGENTCIO AFRICA www . intelligentcio . com