... the local alternative!
Call us now on 01963 250788
Shop Open Monday - Friday, 9am - 5pm
office@computing-mp.co.uk

Remote ConnectionFacebookTwitter

BYOD and the Consumerisation of IT

BYOD and the Consumerisation of IT

Well BYOD stands for “Bring Your Own Device” and it tries to address the issue where an employee or regular contractor uses a personal device (laptop, phone, tablet) to connect to company systems. In English it usually means getting your company emails on your personal phone or tablet. The consumerisation of IT is the blending of personal and business use of technology devices and applications. In today's enterprise, the consumerisation of IT is being pushed by a younger, more mobile workforce, who grew up with the Internet and are less inclined to draw a line between corporate and personal technology.

More and more, it is unofficially expected that employees (especially managers) remain contactable outside office hours and often take work home with them to do during evenings and weekends. But BYOD brings significant challenges to the company as it must secure data on devices the company may not own. The IT department may need to support a larger selection of devices & operating systems and may need to develop new policies & procedures for data ownership. It’s a real headache for most organisations who don’t necessarily have the skills or expertise to manage this. How you would deal with an employee leaving who used to get company email on his phone and did work at home using his own laptop? Here are some of the things you need to consider

Who will pay for the devices and data coverage required?
What regulations must be adhered to when using an employee device?
What measures will be taken for securing devices prior to use?
Where will data from BYOD devices be stored?
Will there be an agreement for employees that wish to bring their own devices?
What happens if an employee violates your BYOD policy?
What privacy will be granted to employees using their own devices?
What support will the organisation provide for BYOD users?
What safeguards are in place if a device is compromised?
What methods will be used for securing devices before they are retired, sold, or disposed of?

 


and here are some top tips for helping to secure devices and reducing your risk
Use password protected access controls
Control wireless network and service connectivity
Control application access and permissions
Keep software & applications up-to-date and back up data regularly
Never store personal financial data on a device
Beware of free apps and software (they’re only free for a reason!)
Run mobile antivirus software or scanning tools
Use Mobile Device Management (MDM)

BYOD is a broad subject that will keep the digital business engaged for quite some years to come. The lists of pros & cons are long and there is no universal best BYOD strategy as each organisation lives and works in a different way. Furthermore, the employees play an essential role in all this and they need to be consulted and engaged throughout the process.

As always, if you need help with this or anything else, you know where to come.

Back

Added: 22nd August 2018

Remote ConnectionFacebookTwitter