Implementing a Strong BYOD Policy

Implementing a Strong BYOD Policy

BYOD, or bring-your-own-device, offers employees mobility, convenience and comfort from working with their own laptop, smartphone, tablet or other devices. Allowing employees to work from their devices can increase productivity, collaboration and performance. BYOD

BYOD policies have flaws. The lack of IT control can open up the network to security, privacy and data management issues. ITIC/KnowBE4 found 56 percent of corporations don’t have policies to deal with lost, stolen or compromised BYOD equipment and half indicated that these devices might have been hacked. ZDNet reported that 30 to 35 percent of BYOD activity was “invisible to IT”, according to research firm Ovum.

Having a well developed BYOD policy can allow companies to harness the power of BYOD without the risks. IT departments should be involved in the creation of security polices, like antivirus programs, password creation and limiting the outside applications that can be installed on a device. IT departments should also make themselves familiar with the devices, operating systems and software that allowed devices use, in order to provide support. There should be a clear plan of attack for a device that is compromised, including having strategies and procedures for removing data and access on devices that belong to employees that have been fired or leave the company.

Implementing BYOD polices adds an additional method of connectivity and gives employees comfort and freedom, which can lead to improved performance. Through employee training and strong regulations, BYOD can be an asset for any company.

(Visited 118 times, 1 visits today)

Leave a Reply

This site uses Akismet to reduce spam. Learn how your comment data is processed.