10 Best Practices for BYOD

 
 
By Dennis McCafferty  |  Posted 05-08-2015 Email
 
 
 
 
 
 
 
 
 
  • Previous
    Keep Usage Policies Updated
    Next

    Keep Usage Policies Updated

    Make sure policies respond to tech changes while remaining device-agnostic. In addition, they need to address the level of usage/activity that IT can monitor in the interest of protecting corporate data.
  • Previous
    Have Employees Sign BYOD Agreements
    Next

    Have Employees Sign BYOD Agreements

    This way, there won't be any question about what is allowed and what isn't-including IT's right to remote wipe all device data (including personal data) if a device is lost or stolen.
  • Previous
    Simplify Onboarding
    Next

    Simplify Onboarding

    Through self-servicing, you'll minimize IT's involvement every time a user needs to connect a device to the network.
  • Previous
    Conduct a Network Assessment
    Next

    Conduct a Network Assessment

    BYOD smartphones and tablets demand lots of bandwidth and network resources due to the downloading of high-quality video and rich applications. So assess your switch and router networks, Internet pipes and remote location connections to ensure they can handle the load.
  • Previous
    Secure the End Points
    Next

    Secure the End Points

    Adapt an embrace-but-contain strategy by reviewing WiFi security, VPN access and authentication technologies.
  • Previous
    Stay Adaptable on Upgrades
    Next

    Stay Adaptable on Upgrades

    Apple and Samsung won't update you on their latest advancements. Expect users to introduce new code to the enterprise at all times, creating connectivity, app and security issues.
  • Previous
    Incorporate 24/7 Support
    Next

    Incorporate 24/7 Support

    Downtime is no longer an option. If you can't staff for ‘round-the-clock IT availability, bring on a managed services partner who can.
  • Previous
    Track Impact
    Next

    Track Impact

    To determine ROI, evaluate how much more BYOD is giving in improved productivity, customer engagement, hardware cost savings and staff retention than it's taking in terms of IT's time involvement and increased risk.
  • Previous
    Consider a Device Ceiling
    Next

    Consider a Device Ceiling

    If BYOD is getting out of hand, you can always implement a policy to limit the amount of devices that users can connect to the network.
  • Previous
    Emerge as a BYOD Advocate
    Next

    Emerge as a BYOD Advocate

    Ultimately, BYOD should benefit your organization through greater mobility, efficiencies and innovation. If you proactively champion its value, you'll more likely gain buy in from users on acceptable practices (while avoiding shadow IT).
 

There's little doubt that bring-your-own-device (BYOD) adoption has profoundly changed the enterprise. By 2017, one-half of organizations will no longer provide devices to their employees, according to industry research. Nine out of 10 employees already use their personal smartphones for work. Nearly six out of 10 IT decision makers believe they would be at a competitive disadvantage if they didn't embrace BYOD. This speaks to the ongoing evolution of how CIOs and tech teams perceive BYOD: At first, many in IT resisted it. Then, they accepted it as a necessary evil. Today, however, they appreciate its many benefits in creating a highly agile, mobility-driven, productive organization, and are more than willing to work with users to get the most out of BYOD while minimizing cyber-security risks. Toward that end, consider the following 10 best practices for BYOD. They cover usage policies, self-servicing, network impact and ROI tracking. In the best of possible worlds, such measures should create a transparent BYOD culture, one in which users won't be tempted to go around the tech department and deploy unapproved mobile devices and apps (i.e., shadow IT). Our best practices are adapted from recommendations posted by DPSciences and AVC.

 
 
 
 
 
Dennis McCafferty is a freelance writer for Baseline Magazine.

 
 
 
 
 
 

Submit a Comment

Loading Comments...
 
Manage your Newsletters: Login Register