Toshiba Laptop Warranty

  • Subscribe to our RSS feed.
  • Twitter
  • StumbleUpon
  • Reddit
  • Facebook
  • Digg

Monday, 18 February 2013

Managing the ‘Bring Your Own Device’ Trend

Posted on 14:11 by Unknown
One of the changes occurring in the workplace over the last few years is the growing number of personal devices, such as smart phones and tablets that are being used for work purposes.

This ‘Bring Your Own Device’ trend, or BYOD, is certainly here to stay. But while this use of technology clearly has its advantages, the risks associated with this practice are often underestimated, not only by the staff but also by the company’s management.
To understand where these risks lie, let us look at the application that is most commonly used on personal devices, namely email. In a typical example, an employee’s smart phone will be configured to connect to the corporate Exchange server. This makes a lot of sense, because it allows that employee to access their email when they are on the road, out at lunch, or even just sitting in front of the television at night. And because Microsoft Exchange does a lot more than just handle emails, that staff member can also access the company contacts database, view his or her appointments, and so on. All of this means that the employee is able to communicate more effectively, while the company benefits from enhanced productivity. So why would anyone mind?

Well, the trouble is that a lot of confidential information is sent via email these days. Financial statements, management reports, HR documents, product development information and confidential client information, to name a few examples, are all sent via email. In the past, email was largely contained within the business premises, where it was safeguarded by the company’s security systems.
Of course, there were those roaming laptop users who carried data on their machines out into the wild. But those machines were still protected, to varying degrees, by the company’s security systems. Password complexity policies were enforced by the company’s IT department, who also managed the anti-virus protection, configured hard drive encryption, and so on.

With BYOD, however, that picture changes. No longer does the business control the device. It’s a personal machine, which has the staff member’s own software and data on it, as well as corporate data. The configuration of the machine is not managed by the company, so there is no way to control the security of that device. Even simple things, such as a suitable password policy, cannot be controlled by the business. Considering how easily these devices can be misplaced or stolen, the risks to the company are significant.
So what can be done about this, you ask? Start by drafting a clear BYOD policy that can help your company reduce the risks associated with BYOD. Considerations to implement might include:

1.       Specify What Devices Are Permitted – There are many device choices, from iOS-based phones and tablets to Android handhelds and many others. Make it clear to employees which devices you will support; in addition to whatever corporate-issued devices you continue to deploy—and which you won't.

2.       Establish a Stringent Security Policy for all Devices - Users tend to resist having passwords or lock screens on their personal devices. However, there is often sensitive information to which devices connected to your network have access to allow such easy access

3.       Make It Clear Who Owns What Apps and Data - While it seems logical, on the face of it, that your company owns the personal information stored on the servers that your employees access with their devices, it becomes more problematic when you consider the problem of wiping the device in the event it is lost or confirmed stolen. When you wipe the phone, traditionally all content on the phone is erased, including personal pictures, music and applications that in many cases the individual, not the company, has paid for.

4.       Define a Clear Service Policy for Devices under BYOD Criteria - It's important for employees to understand the boundaries when questions or problems appear. Considerations for IT support need to be defined.

5.       Set Up an Employee Exit Strategy – What will happen when employees with devices leave the company? How do you enforce the removal of e-mail access, data and or any other proprietary applications and information?
With these few steps, a company can significantly reduce the risks associated with BYOD. If you need assistance with creating a policy, please give us a call.
- Janet F, IT Consultant
 
Northern Computer - Your Trusted Partner
#1 - 495 Banks Road Kelowna, BC V1X 6A2
Phone: 250.762.7753 Fax: 250.861.1861 Toll-Free: 1.877.257.2896
Email: sales@northerncomputer.ca or service@northerncomputer.ca
Web: http://www.northerncomputer.ca
Email ThisBlogThis!Share to XShare to FacebookShare to Pinterest
Posted in Email, PC, smart phones, tablets | No comments
Newer Post Older Post Home

0 comments:

Post a Comment

Subscribe to: Post Comments (Atom)

Popular Posts

  • Learn About Unified Communications - VOIP Kelowna
    Cisco Unified Communications combine all forms of business communications into a single, unified solution that enables your organization to...
  • Compaq Presario V6608AU Chipset and Audio Drivers For Windows 7
    Here we have information about Compaq Presario V6608AU Chipset and Audio Drivers For Windows 7. As we know it, the Compaq Presario V6608AU i...
  • Driver Acer Aspire V3-471G
    Acer Aspire V3-471G has a superior performance with the latest generation of Intel or AMD or NVIDIA graphics chips supported AMD graphics. I...
  • Driver Of Axioo Neon CLW
    Axioo Neon CLW instant preview 5.F20: This laptop comes with 12.1-inch screen with technology intel core i5 prosssesor. Make you a longer lo...
  • Exporting Your Email Contacts
    So you’ve organized your contacts nicely into your Outlook email client and want to make sure you keep your five contacts (maybe that’s just...
  • Maintain Your Favorite Bookmarks – Online
    These days, more and more data is being stored in the Cloud which allows you to access to your data from anywhere. The cloud also allows you...
  • Asus A43SJ Drivers For Windows 7 / 32bit
    Asus A43SJ Drivers For Windows 7 / 32bit | Are you searching the Asus A43SJ Drivers especially For Windows 7 / 32bit? here, we have informat...
  • Northern Computer Long Haul Adventure Race
    At Northern Computer we are committed to supporting causes that matter to our communities. We aim to make a difference through corporate don...
  • Windows 7, The empire strikes back…..
    As of April 7 th , 2009, Microsoft has ended support of Windows XP, the longest running operating system in history.   The latest version, W...
  • MS Office 2010 - Different Versions, Different Uses and Shortcuts
    Now that Microsoft has had its Office 2010 versions out for several months, a lot of people are asking if they should make the change.   The...

Categories

  • Acer
  • advertising
  • antivirus
  • application
  • Asus
  • Backup
  • battery
  • Cloud
  • Compaq
  • computer
  • CPU
  • data
  • digital signage
  • Email
  • Hard Drive
  • hardware
  • HP
  • Internet
  • IT
  • Laptop
  • marketing
  • monitor computer video hardware
  • Motherboard
  • Networking
  • Notebook
  • Office Ergonomics
  • PC
  • Printer
  • Printers
  • purchase
  • RAM
  • Recovery
  • recycle
  • remote desktop
  • security
  • server
  • Service and Repair
  • signal
  • smart phones
  • Software
  • software server
  • tablets
  • tax
  • Tips
  • TV
  • Virus
  • VOIP
  • warranty
  • web
  • Windows
  • wireless

Blog Archive

  • ▼  2013 (52)
    • ►  November (1)
    • ►  October (3)
    • ►  June (2)
    • ►  May (4)
    • ►  April (6)
    • ►  March (3)
    • ▼  February (9)
      • How to Set a Password to Microsoft Office Files
      • Managing the ‘Bring Your Own Device’ Trend
      • Making the Most of HST While it’s Here
      • Driver Notebook HP Pavilion G4-133xTX Windows 7 32...
      • Driver Netbook HP Mini 110 Windows 7 32bit / x86
      • Driver Axioo Neon CLW 7846 Windows 7 32bit / x86
      • Driver Toshiba Satellite C800 for Windows 7 32bit ...
      • Driver of Acer Aspire One AOA150
      • Driver Of Acer Aspire One AO522
    • ►  January (24)
  • ►  2012 (25)
    • ►  November (2)
    • ►  October (3)
    • ►  September (1)
    • ►  June (2)
    • ►  May (2)
    • ►  April (3)
    • ►  March (5)
    • ►  February (1)
    • ►  January (6)
  • ►  2011 (56)
    • ►  December (5)
    • ►  November (8)
    • ►  October (3)
    • ►  September (3)
    • ►  August (3)
    • ►  July (7)
    • ►  June (6)
    • ►  May (3)
    • ►  April (8)
    • ►  March (5)
    • ►  February (4)
    • ►  January (1)
  • ►  2010 (29)
    • ►  December (5)
    • ►  November (3)
    • ►  October (4)
    • ►  September (2)
    • ►  August (1)
    • ►  June (1)
    • ►  April (13)
Powered by Blogger.

About Me

Unknown
View my complete profile