• Skip to primary navigation
  • Skip to main content
site logo
  • About
    • Approach
    • Partnerships
    • Mission
    • Leadership
    • Awards
    • Arraya Cares
  • Solutions
    • Solutions

    • Hybrid Infrastructure
      • Hyperconverged
      • Infrastructure as a Service
      • Servers, Storage, and Virtualization
      • Data Protection
      • Disaster Recovery & Business Continuity
    • Apps & Data
      • AI
      • Automation
      • Customizations
      • Visualizations & Integrations
      • Migrations
    • Network
      • Enterprise Networks
      • Wireless Connectivity
      • Cloud Networking Solutions
      • IoT
    • Cybersecurity
      • Endpoint Security
      • Network Security
      • Cloud Security
      • Application Security
    • Modern Workplace
      • Microsoft Licensing
      • Productivity & Collaboration
      • Modern Endpoint Deployment & Management
      • Microsoft Compliance & Risk
      • Backup
      • Cloud
  • Services
    • Services

    • Managed Services
      • Service Desk
      • Outsourced IT
      • Managed Security
      • Managed NOC
      • Arraya Adaptive Management for Microsoft Technologies
      • ADEPT: Arraya's White Label Program
    • Advisory Services
      • Assessments
      • Strategy
      • vCTO
      • vCISO
      • Enterprise Architecture
    • Staffing
      • Infrastructure Engineering
      • Security & Compliance
      • Application & Software
    • Professional Services
      • Project Management 
      • Systems Integration 
      • Mergers & Acquisitions
      • Knowledge & Skills Transfer 
  • Industries
    • Education
    • Finance
    • Healthcare
    • Legal
    • Manufacturing
    • Software and Services
  • Insights
    • News
    • Blog
    • Events
    • Videos
    • Case studies
  • Careers
  • CSP Login
search icon
Contact Us

Keep Their Holiday Gifts from Becoming Your Cyber Security Risks

In the wake of the holiday season, now that the bows and wrapping paper have been discarded, people likely have at least a few new high-tech toys to enjoy. It’s safe to assume those new devices vvv-0216-img_0973-304will find their way into their owners’ work routines sooner rather than later.

High-tech items were in high demand this year, according to a study by SquareTrade. It found Americans planned to spend more than $75 billion on electronics in celebration of the season of giving. Put it another way: More than 50% of those who participated in the study said their shopping lists included electronics.

So what did everybody buy? The study also looked at the most popular electronics to give and receive. Unsurprisingly, tablets were a hot item on both lists, but they weren’t the only mobile device to make the cut. The study showed:

  • 37% of people plan to give a tablet
  • 29% of people hope to receive a tablet
  • 24% of people would like to receive a smartphone

Also on the lists were devices such as televisions, gaming consoles, and even headphones. However, it’s less likely any of those devices will become IT’s problem come January.

Enabling and supporting a mobilized workforce

Is your IT team ready for the avalanche of new devices users will be bringing back with them as they return from the holidays? Here are a few helpful pointers to keep in mind on allowing employees to use the devices they want to at work without compromising security:

Tip #1: Just having a policy isn’t enough. It goes without saying that, if you haven’t yet developed a mobile device policy for users to follow, that should be a high priority in 2017. If you do have a policy, regularly circulate it – and where it can be found, e.g., handbook, intranet, etc. – among end users. This keeps it top of mind for veteran staffers and serves as a helpful introduction for new hires. It’s also important to make sure folks actually understand the policy. Small test groups are a good way to solicit feedback, but, if they’re not an option, remember to keep the policy as brief and jargon-free as possible.

Tip #2: Implement tools to support your policy. Once you have a policy that makes sense for IT and for end users, be sure to give it some teeth. There are plenty of secure mobility-enabling, policy-enforcing solutions on the market. These tools can help you secure data through encryption or by setting restrictions on who can access it – and what they can do with it once they have it. Furthermore, it’s critical for IT teams to consider tools which enable them to remotely wipe a device of sensitive info. This is vital in the event a device should go missing or the company parts ways with a device’s owner.

Tip #3: Separate your stuff from theirs. The data may be your responsibility, but the device is theirs. Sandboxing your business’ data and apps allows for the proper (and secure) separation between personal and professional data. That lets users maintain control over their brand new device while IT rests easy knowing the business is protected against being exposed to inadvertent risks by the employee.

Need help with mobility? Here’s where to turn

Struggling with BYOD and the proliferation of personal devices in the workplace? Arraya’s team can help. We’re ready to start a conversation about building BYOD strategies and implementing the tools needed to provide the secure enterprise mobility that’s rapidly becoming a necessity in many of today’s top workplaces.

Visit www.arrayasolutions.com/contact-us/ to open up a line of communication today. Or, catch up with us on social media: Twitter, LinkedIn, and Facebook. While you’re there, follow us to stay in the know about all of our latest special events, blog posts, and industry insights.

Arraya Insights
Back to Top
Arraya Solutions logo

We combine technological expertise and personal service to educate and empower our customers to solve their individual IT challenges.

518 Township Line Road
Suite 250, Blue Bell, PA 19422

p: (866) 229-6234     f: (610) 684-8655
e: info@arrayasolutions.com

  • Careers
  • Privacy Policy
  • Contact Us

© 2025 Arraya Solutions. All rights reserved.

Facebook Twitter YouTube LinkedIn
Manage Cookie Consent
We use cookies to enhance your experience. By selecting “Accept,” you agree to our cookie policy.
Functional Always active
The technical storage or access is strictly necessary for the legitimate purpose of enabling the use of a specific service explicitly requested by the subscriber or user, or for the sole purpose of carrying out the transmission of a communication over an electronic communications network.
Preferences
The technical storage or access is necessary for the legitimate purpose of storing preferences that are not requested by the subscriber or user.
Statistics
The technical storage or access that is used exclusively for statistical purposes. The technical storage or access that is used exclusively for anonymous statistical purposes. Without a subpoena, voluntary compliance on the part of your Internet Service Provider, or additional records from a third party, information stored or retrieved for this purpose alone cannot usually be used to identify you.
Marketing
The technical storage or access is required to create user profiles to send advertising, or to track the user on a website or across several websites for similar marketing purposes.
Manage options Manage services Manage {vendor_count} vendors Read more about these purposes
View preferences
{title} {title} {title}