tech blog header

Why BYOD Isn't So Bad

Posted on Wed, Sep 12, 2012

IT services: BYOBBring Your Own Device, or BYOD, is a new trend developing in workplaces. Employees use their own personal mobile devices for workplace purposes, such as accessing work email, databases, reading or editing documents, and more.

Because it can go relatively unnoticed and it is hard to regulate, many organizations tend to dislike BYOD. The heterogenous systems, potential for viruses and hacking, and possible loss of data all present serious problems for an organization. But despite these issues, BYOD may not be all that bad. Here are a few thoughts to ponder:  
  • Happier employees: By allowing them to use the device they like and that can do the job, employees will appreciate the flexibility to do their job in the way that suits them. Happier employees can be more productive employees.
  • Lower costs for more current technology: Because updates occur frequently, purchasing new software and/or hardware with each update can increase your expenditures and reduce your bottom line. But when employees are content to use their personal devices for work purposes, your organization gets a chance at trying out the latest technology without necessarily needing to purchase it immediately. Additionally, employees can tell you the features and pitfalls of each new technology. And that can help you stay current with your clients.
  • Acceptance: Consumer devices will enter the corporate world – therefore it is better to find the right way to address, and possibly even embrace, this change instead of engaging in a tug of war with employees.

If incorporating BYOD feels right for your organization, here are a few ways to make it more secure:  
  • Find out what employees are using and for what reasons.
  • Determine the greatest security gaps in the devices that employees are using. With this knowledge, your IT support or MSP can prevent issues or fix disruptions as easily as possible to ensure business continuity.
  • Apply limits on what people can do. Not that anyone likes constraints, but identifying the most likely breeches and ensuring they are not used or encountered can help minimize disruptions. Documenting these reasons in your organization’s policies and procedures ensures that everyone is on the same page.
  • Security: To manage security issues, applying authentication, defined authorization, rules, password management, and supplying credentials to access company networks, documents, and emails can also minimize potential intrusion. Additionally, if someone wants to use new technology, get them to inform IT before doing so in order to reduce potential security risks.

 

Regardless of ownership, BYOD is still the usage of devices to perform work, and they are subject to the same infiltrations as your company’s systems. Therefore, working with, instead of against, workplace and technology changes can go a long way in creating a workplace brimming with trust and flexibility. Implementing the mechanisms and policies to ensure security can also show that BYOD is accepted by your organization. If you need some direction to implement BYOD, contact a local IT company that has the knowledge and expertise in this domain to help you find the best combination of flexibility and security.

BYOD Related Posts:

How to Become a BYOD Guru

Making BYOD Work For My SMB

3 IT Services Challenges in the BYOD World

Tags: BYOD

Free Whitepaper

Follow Us