Categories: Articles

Make BYOD work for you

used with permission from HP Technology at Work

The reality of bring your own device (BYOD) is unavoidable. If your organization has yet to implement a BYOD strategy, you can take several steps to get started. But first, know that the question is no longer whether you will support mobile devices. Instead, it’s how do we secure and manage these devices in a user-friendly way?

A Forbes Insights and Google survey of U.S. business executives found that by 2016 more than half of leaders expect to use mobile devices instead of PCs as their primary business platform. By 2020, HP estimates that each professional in the workplace will use more than six mobile devices.

A well-crafted BYOD strategy can facilitate increased employee productivity and engagement in an era of mobile-first behavior that has begun to blur the lines between work demands and personal usage. As you and your team develop the appropriate strategy for your organization, realize that there is no “one-size-fits-all” solution to this endeavor.

“It is important to remember that BYOD itself is not a technology,” says Dragana Beara, Senior Solutions Marketing Manager, HP Networking Global Marketing. “It’s a behavior. The challenge that organizations currently face is deciding how to respond to this behavior and the technology solutions they need to enable that response.”

Your business is unique, and the BYOD strategy it needs to manage mobile devices should be as well.

Forming a strategy

“Mobility itself can be described as providing universal access to people, apps, and data. However, most existing networks are completely unprepared to deliver services in this way,” Beara says. “The ultimate aim of BYOD—driving productivity and engagement—can only be fully realized when the behavior is embraced and your infrastructure has been transformed to accommodate it.”

Your team should consider and resolve a series of questions that will guide your development of a BYOD strategy:

  • What devices will be permitted? In an age of tablets, work phones, personal phones, and more, your policy should outline which devices you will support and which you will not.
  • What will your security policy include? Should you require employees to use lock screens? Will you allow BYOD devices to be used by others outside of your organization? Consider all potential security threats as you craft this portion of your policy.
  • What will your service policy encompass? As employees use their personal devices more for work purposes, they must also be clear about what technical issues your company will or will not help resolve.
  • What apps will you allow, and which will you prohibit? Will you allow social media apps? Will employees be allowed to use replacement email or VPN clients? You may wish to limit the number of apps that you allow as well.
  • How will you determine and track what data the business owns? Know what data and apps you own in the event of a stolen or lost device, which may need to be wiped clean.
  • What will your acceptable use policy include? If an employee sends out inappropriate material over your VPN, will there be any consequences? Outlining what is acceptable or prohibited provides your organization with a much-needed safeguard.
  • How will you treat mobile devices when an employee leaves a company? Outlining the process to take when employees leave the company—with their BYOD-covered devices—is necessary to prevent security breaches and counter the risk of information falling into the wrong hands.

Don’t forget to audit your BYOD policy once you have implemented it. Also, we recommend you incorporate a zero-tolerance policy for noncompliance, to ensure everyone adheres to your new strategy.

Bryan Antepara

Bryan Antepara: IT Specialist Bryan Antepara is a leader in Cloud engagements with a demonstrated history of digital transformation of business processes with the user of Microsoft Technologies powered by the team of eMazzanti Technologies engineers. Bryan has a strong experience working with Office 365 cloud solutions, Business Process, Internet Information Services (IIS), Microsoft Office Suite, Exchange Online, SharePoint Online, and Customer Service. He has the ability to handle the complexity of moving data in and out of containers and cloud sessions, makes him the perfect candidate to help organizations large and small migrate to new and more efficient platforms.  Bryan is a graduate of the University of South Florida and is Microsoft Certification holder.

Recent Posts

The Executive’s Guide to Security Operations Center Models

Cyber threats never take a day off, never clock out and go home at the…

3 days ago

Introduction to Azure Services

Building, deploying, and managing applications via Microsoft's global network of data centers is easier with…

3 days ago

Introduction to Microsoft Copilot

Microsoft Copilot is a tool, powered by AI, that aims to boost your productivity within…

4 days ago

Project Management: Why is it important?

Making things happen is the art and science of project management. The process involves managing…

1 week ago

Enhancing Website Performance and User Experience Through Caching Strategies

In today's fast digital life, website performance is important, as it holds visitors and ensures…

1 week ago

Protecting Municipal Data: Security Tips for City Officials

The FBI reported that cyber attacks against government facilities saw an increase of almost 36…

1 week ago