Categories: Articles

Make BYOD work for you

used with permission from HP Technology at Work

The reality of bring your own device (BYOD) is unavoidable. If your organization has yet to implement a BYOD strategy, you can take several steps to get started. But first, know that the question is no longer whether you will support mobile devices. Instead, it’s how do we secure and manage these devices in a user-friendly way?

A Forbes Insights and Google survey of U.S. business executives found that by 2016 more than half of leaders expect to use mobile devices instead of PCs as their primary business platform. By 2020, HP estimates that each professional in the workplace will use more than six mobile devices.

A well-crafted BYOD strategy can facilitate increased employee productivity and engagement in an era of mobile-first behavior that has begun to blur the lines between work demands and personal usage. As you and your team develop the appropriate strategy for your organization, realize that there is no “one-size-fits-all” solution to this endeavor.

“It is important to remember that BYOD itself is not a technology,” says Dragana Beara, Senior Solutions Marketing Manager, HP Networking Global Marketing. “It’s a behavior. The challenge that organizations currently face is deciding how to respond to this behavior and the technology solutions they need to enable that response.”

Your business is unique, and the BYOD strategy it needs to manage mobile devices should be as well.

Forming a strategy

“Mobility itself can be described as providing universal access to people, apps, and data. However, most existing networks are completely unprepared to deliver services in this way,” Beara says. “The ultimate aim of BYOD—driving productivity and engagement—can only be fully realized when the behavior is embraced and your infrastructure has been transformed to accommodate it.”

Your team should consider and resolve a series of questions that will guide your development of a BYOD strategy:

  • What devices will be permitted? In an age of tablets, work phones, personal phones, and more, your policy should outline which devices you will support and which you will not.
  • What will your security policy include? Should you require employees to use lock screens? Will you allow BYOD devices to be used by others outside of your organization? Consider all potential security threats as you craft this portion of your policy.
  • What will your service policy encompass? As employees use their personal devices more for work purposes, they must also be clear about what technical issues your company will or will not help resolve.
  • What apps will you allow, and which will you prohibit? Will you allow social media apps? Will employees be allowed to use replacement email or VPN clients? You may wish to limit the number of apps that you allow as well.
  • How will you determine and track what data the business owns? Know what data and apps you own in the event of a stolen or lost device, which may need to be wiped clean.
  • What will your acceptable use policy include? If an employee sends out inappropriate material over your VPN, will there be any consequences? Outlining what is acceptable or prohibited provides your organization with a much-needed safeguard.
  • How will you treat mobile devices when an employee leaves a company? Outlining the process to take when employees leave the company—with their BYOD-covered devices—is necessary to prevent security breaches and counter the risk of information falling into the wrong hands.

Don’t forget to audit your BYOD policy once you have implemented it. Also, we recommend you incorporate a zero-tolerance policy for noncompliance, to ensure everyone adheres to your new strategy.

Bryan Antepara

Bryan Antepara: IT Specialist Bryan Antepara is a leader in Cloud engagements with a demonstrated history of digital transformation of business processes with the user of Microsoft Technologies powered by the team of eMazzanti Technologies engineers. Bryan has a strong experience working with Office 365 cloud solutions, Business Process, Internet Information Services (IIS), Microsoft Office Suite, Exchange Online, SharePoint Online, and Customer Service. He has the ability to handle the complexity of moving data in and out of containers and cloud sessions, makes him the perfect candidate to help organizations large and small migrate to new and more efficient platforms.  Bryan is a graduate of the University of South Florida and is Microsoft Certification holder.

Recent Posts

Top 5 Collaborative Tools in Microsoft 365 Drive Productivity and Innovation

In today’s fast-paced digital landscape, businesses cannot thrive without effective collaboration. Microsoft continues its unwavering…

3 days ago

7 Essential Contact Information Tips for Email Signatures to Enhance Your Professional Image

An email signature accomplishes much more than simply telling readers who you are and how…

1 week ago

Maximizing Threat Response Efficiency with Security Copilot

Cyber security professionals work hard to safeguard companies’ information. But with criminals constantly changing their…

2 weeks ago

Why should a firm use DMARC? What is the need?

Domain-Based Message Authentication, Reporting, and Conformance (DMARC) is an e-mail security protocol designed to validate…

3 weeks ago

eCare Cloud Backup is in fashion. It’s the new you!

My job is to manage my law office’s cloud servers here at Justice Freaks.  As…

4 weeks ago

I Think I’m Dating an AI

My worst nightmare would be to date someone who isn’t who they say they are.…

4 weeks ago