Top 5 BYOD Blunders When Trying To Realize The Productivity Potential Of Workers Bringing Their Own Devices To Work |
Blunder
# 1 - No pre planning
Some companies just think – ‘oh people are using their
cellphones at work, ok let them use the company network and we will see how it
goes and deal with the issues as they arise’. Companies that just open their
networks to BYOD without a plan will have real security problems, and they will
probably issues that will not be easy to fix or deal with as they arise.
You need to ask questions like:
Who
do we want to use the network?
Do
we want to control access to data or the network based on job function?
Do
we have enough network resources for the additional load?
Blunder
# 2 - No BYOD policy
A BYOD policy sets the terms and conditions in which an employee may use a device on the network. These policies can state which activities and apps can be used on the network. A good example of a BYOD policy template is here:
Blunder
# 3 - Give access to all data
Networks are set-up with different level of access, and can be configured based on a user by user base. Organize your network so data is only accessed by those who really need it, not everyone on the network.
Network Security - Top BYOD Blunders When Trying To Realize The Productivity Potential of BYOD |
Blunder
# 4 - Device selection
Most people don't want to be told what phone or tablet
they can use, but it does make a difference for security and performance of the
network. Do your research, and publish a recommended list of devices that offer
the security and network features that are critical to your network maintaining
a high security level.
Blunder
# 5 - Lost devices
People lose their phones and tablets all the time. They
are often stolen and the phones are then hacked and all data is accessed. Large
MDM system allow IT departments to wipe the phones data remotely, and some apps
like Tigertext can remote wipe messages as well setting text messages to
auto-delete.
Top 5 BYOD Blunders When Trying To Realize The Productivity Potential of BYOD |
No comments:
Post a Comment