THE HIGHS AND LOWS  OF BYOD

THE HIGHS AND LOWS OF BYOD

In the workplace, employees sometimes find their IT departments struggle to keep up with the pace of technology change which is why so many adopt the bring your own device (BYOD) approach to work.   From personal laptops to tablets to smartphones, this world of IT self-sufficiency has meant that employees often have the newest and latest technology at their fingertips.   Companies end up playing catch up but instead of building a barrier against BYOD, they need to understand the benefits and the risks.

 

When companies adopt a BYOD strategy, they find that there is often more employee satisfaction due to work flexibility. Allowing staff to bring in their own devices can improve productivity and staff motivation. They are happier, more comfortable and faster working with technology that is familiar. There’s also cost savings for the business due to the reduction in hardware spend, software licensing and device maintenance. Companies do however need to limit the number of devices users can use.

 

With all these BYO devices floating around an office, businesses need to be aware of the implications of staff accessing and storing corporate information on their own device. IT departments will have less control over the BYOD compared to a traditional company owned and provided device. Data security is the number one concern. What do they have access to? What security is in place and what happens if one of these devices is lost or stolen?

 

IT departments and managers need to specify the types of data that can be stored on the unsupported BYOD. Network security is absolutely paramount. By encrypting sensitive data, preventing local storage of company documents or limiting access to non-sensitive areas, a mobile strategy can evolve. If any device accesses or stores company data, a full risk assessment should take place against a variety of threats and the appropriate measures put in place. Anti-malware, encryption, passcodes, remote wipe, jailbreaking prevention, sandboxing are all ways to protect a system without compromising security. It’s also important to have a process in place for quickly revoking access to a device a user might have in the event of a loss or theft.

 

Whilst the use of BYOD has given rise to a number of data protection concerns, employees want to have the same technological experience at work as they do at home. It is still possible to give employees what they want, but your IT department still needs to manage and secure important data on mobile devices, whether they are owned by a company or an employee.

要查看或添加评论,请登录

Ian Burns的更多文章

  • LESS IS MORE FOR TRUE IT EFFICIENCY

    LESS IS MORE FOR TRUE IT EFFICIENCY

    With the world of technology evolving every day – and a gadget for every possible need – it’s hard to figure out just…

    2 条评论
  • What the Internet of Things (IoT) Means to Your Data Security

    What the Internet of Things (IoT) Means to Your Data Security

    We hear the term Internet of Things (IoT) in the tech world all the time now, but what does it really mean for us and…

    2 条评论
  • OneDrive: the perils of charging for cloud storage

    OneDrive: the perils of charging for cloud storage

    Written by Ian Burns Categorised Services Following the November announcement that Microsoft has reduced free storage…

  • TECH TIME IN THE CLASSROOM

    TECH TIME IN THE CLASSROOM

    With the blackboard relegated to the educational dump of history, and a plethora of technological devices being used…

  • Get I.T. What you want when you want it!

    Get I.T. What you want when you want it!

    Have you experienced problems ordering products outside of your regular suppliers’ range of core products? Have you…

  • All HAIL, MICROSERVICES!

    All HAIL, MICROSERVICES!

    In the good old, bad old days traditional, single tiered monolithic apps were the norm as they were fast to develop…

    1 条评论
  • Prevent issues before you need to cure them

    Prevent issues before you need to cure them

    KEEPING YOUR COMPUTERS AND NETWORK IN GOOD HEALTH THROUGH RMM Your company’s productivity is absolutely key so when a…

    1 条评论
  • Goodbye IE but could it leave the back door open?

    Goodbye IE but could it leave the back door open?

    It’s an end-of-life scenario for Internet Explorer 8, 9, 10 with Microsoft no longer supporting these older versions of…

  • Inspired E-Store come in and have a look!

    Inspired E-Store come in and have a look!

社区洞察

其他会员也浏览了