BYOD Policy

BYOD Abounds: Can the Enterprise Flourish

Can the Enterprise Flourish With BYOD

BYOD is the trend of the new generation. Increased access to tablets, smartphones, robust data networks and even Wi-Fi everywhere has extended the capabilities of the professional in the field. When the BlackBerry first emerged on the market, the enterprise acquired, provisioned and controlled the mobile device for the workforce, enabling access to key applications and information, while also monitoring activity.

BYOD: Introduction

The demand for increased mobility has spurred a new phenomenon – BYOD. Employees are opting for the Bring Your Own Device to work strategy, balancing personal and professional conversations and information on the same device. The BlackBerry is no longer the smartphone of choice as the iPhone and Android dominate the market. BYOD has proven to be an effective strategy with the right policy in place, but how can it truly support the initiatives of the enterprise?

There are a few realities that accompany the adoption of BYOD:

Employees select the brand and type of device.

While employees enjoy the freedom of selecting their own preferred brand and operating system, enterprise IT recognize the different challenges working in varied environments. It may be more effective for the corporate policy to allow BYOD to only include selected, approved brands, models and operating systems.

Employees control the level of personal information contained on the device.

This is an important point if there is no separation between personal and corporate information. For example, if baby pictures are mixed with corporate or customers proprietary information, that’s a problem. Employees should be allowed to load their own information on their own device, but it’s up to IT to provide the technology and information to keep personal and professional information separated on the device with the application of mobile applications.

Employees access websites, applications and file sharing services not normally permitted by the enterprise.

this is a critical threat for any network. Users may be accessing a vulnerable hotspot, uploading information to a file share site lacking the appropriate protections or downloading applications with malicious software. The enterprise BYOD policy should include guidelines to acceptable practices and mobile device management applications can be installed that prevent risky activities. The key to the successful application is to inform employees as to these rules and the consequences if those rules were to be broken.

Employees may allow other people to use their device.

This reality is difficult to address from the corporate side. Employees may be educated on the risks involved with allowing other users to access their device. But complete control in this area is difficult. Monitoring and management applications can help control what the individual may do while using the device. However, which is an important step towards protection.

BYOD: Employees may not demonstrate diligence in keeping track of their device.

Regardless of how much the employee uses his or her mobile device. It can still be lost or stolen. If that happens, the finder will have access to a wide range of network applications, proprietary information, authentication information and so much more. This is where keeping personal and private information separate is crucial. As IT management can remotely wipe the device clean of any information that puts the enterprise at risk. Likewise, the employee could opt to wipe everything if personal information lost will also put them at risk.

BYOD: Conclusion

While this list just scratches the surface in terms of the realities that can affect BYOD and the enterprise. They are important points to ensure success in this new environment. Any corporation can resist the trend. And instead purchase Mobile devices for all employees. But that may not always be the optimal choice. By understanding the realities that exist in a BYOD environment. The enterprise is more likely to benefit.