Implementing a Bring Your Own Device (BYOD) program sounds like a win for everyone: your employees get to use the device they already know and like, and your company is not having to purchase all of those devices. It turns out that a BYOD program, while overall beneficial, comes with some inherent risk.
Some of that risk is related to security. Your employees may be accessing unsecured Wi-Fi or leaving their devices logged in and unattended. They may download apps that aren’t approved.
There are also privacy concerns. You need to be able to monitor devices in order to keep your network safe, but your employees are entitled to know what types of information are being collected from their devices.
Just like the overall lines between work and personal lives, the lines are particularly blurry when it comes to a BYOD program. How do you develop a BYOD policy that allows for a secure program that is also satisfactory for employees? Here are five considerations to include in your planning:
Executive Buy-In: As with any company-wide program, you’ll want extensive support for your BYOD implementation. When your leadership is engaged in the decision-making, they will understand the need for certain tools, such as Mobile Device Management (MDM) solutions and the amount of time you’ll need to invest in creating your BYOD policy.
Develop a Security Policy: Your team will need to work through extensive security items, such as acceptable uses, program restrictions, user responsibilities and more. You’ll also have to determine what consequences will be in place in the event an employee violates any security policies.
Develop a Privacy Policy: Determine what you will need to monitor and clearly communicate it to your employees. If you will need access to applications that are for personal use, be straightforward about the necessity of accessing that app and how the information will be used. Design the consent forms you’ll require employees to sign for your BYOD policy.
Plan for Unusual Circumstances: How will you handle an employee that takes a leave of absence or is on maternity leave? You will need a policy to handle misconduct with a device, whether it occurs during office hours or off the clock. Determine what happens to a device when an employee resigns or is terminated.
Plan for Problems: This may be the most important consideration because you have to assume that there will be terminations, resignations, security breaches and privacy issues. It’s not that you hope for these things to happen, but you recognize the inevitable occurrences that are likely to happen and you mitigate that risk as much as possible.
If your company is considering moving to a BYOD program, contact us at Cloud Source. We will help you create an implementation plan, customized to fit your needs and mitigate risks.
Personal devices have become ubiquitous, with the majority of the population having at least one device that can access the internet. Many businesses are taking advantage of this to implement bring your own device (BYOD) policies, allowing their employees to work — in-house or remotely — with their own devices. This can mean a reduction in IT costs and CapEx, while also ensuring that employees are always able to be contacted. However, there are a number of security risks that come with a BYOD program, including:
Bring your own device (BYOD) has the benefit of allowing businesses to cut costs on providing devices to employees, but it also creates a number of security issues. This is an especially important factor to consider for government agencies, which often handle very sensitive data but may not have a focused, detailed policy for employees to follow. Employees aren’t necessarily creating security holes on purpose, but agencies should still have a firm policy in place — or make the decision not to allow employees to bring their own devices at all.
With the explosion in affordable mobile devices like smartphones, tablets, personal laptops, and even smartwatches, many businesses have or are in the process of implementing a bring your own device (BYOD) policy. Software company Code 42 reveals in their 2016 Datastrophe Study that 67% of IT decision makers and 87% of CIOs and CISOs believe that they have a clear and comprehensive policy.
Before technology became the way of the world, enterprise IT had strict control over the network, devices, security measures, and software. However, many businesses are embracing the bring your own device (BYOD) trend and providing full support to employees who wish to use their own devices. The rise of BYOD culture means that the IT department needs to develop the following skills to provide optimal support.