5 Factors Of A Successful BYOD Strategy

Know Your Limits

Even if a guest device doesn't have direct access to corporate file servers or other resources, there may still be nothing preventing it from launching denial-of-service attacks or other malicious behavior. Damage can be prevented or made minimal by examining the network to identify and remove potential bottlenecks. Most often, bottlenecks are found in a server itself, the Internet connection or a company's firewall. It's best to ensure that these pipes are as wide as possible or otherwise resilient to sudden increases in packet traffic. Also, attacks that use genuine IP addresses to attack one or more applications within a corporation's network are much harder to detect than a generic flood of UDP or TCP packets.

Get a roundup of CRN's mobility coverage right to your inbox with the Mobility Insights newsletter.