Skip to main content

5 Tips for Utilizing BYOD

By November 19, 2013June 5th, 2021Technology News

1307593_87254838The concept of Bring Your Own Device has a large range of benefits for businesses, staff, and your customers. BYOD permits employee to use their personal mobile devices (laptops, tablets, and smartphones) for work, and to access privileged company information and applications. Businesses are embracing the BYOD trend because it may help employees be more productive, it increases employee morale and allows the company to be attractive and flexible to employees.

BYOD may be a trend that is extremely difficult to block. Coupled with the benefits, businesses recognize the need to implement a BYOD policy and security system. Embracing BYOD starts by integrating the personal devise into corporate and organizational computing networks, but opening up the pipeline is only the beginning. Here are several tips to ensure your BYOD roll out reviews all considerations.

  1. Your wireless network. The network must be mobile device ready and designed for interference lessening, and high-density traffic.
  2. Security. Using a device for both personal and business can create opportunities for social engineering and the unintentional installation of malicious software. This software could provide both an entry route to a corporate network and access to information stored on the device. Measures can be taken to limit the risk, but not eliminate it. Implement a risk management process to balance the benefits with the associated risk. Also consider how to retrieve confidential or proprietary information from a personal device when an employee leaves their current position.
  3. Liability. Who is responsible for device replacement or repair when it is being used for business purposes? Clearly outline any expectations in the event of loss or damage, and specify who is fiscally responsible for the expense.
  4. Administrative infrastructure. BYOD should not add-on tasks to the already busy IT professionals. It should be a self-served solution with minimal IT intervention. Provide a choice of devices/OS offerings/applications that will allow employees to stay connected at work and be most productive. Not all are created equal. Limitations of certain device specifications, OS and applications will ensure only the ones most appropriate to the business goals are authorized.
  5. Permissions and Policies. Develop a sound usage policy, taking into consideration the security concerns and the permitted uses of personal devices. The policy should explain what information the device can access as well as the technical support an employee can expect to receive. To ensure the policies will be adhered to, involve everyone in the policy development; including IT security staff, system administrators, and employees.

BYOD can provide a great opportunity for a business when it is planned for, offering numerous benefits for both the business and employees. Careful planning in advance can alleviate risks associated with being a BYOD business.

Jason Manteiga

Jason Manteiga

Jason J. Manteiga, Vice President of Olmec Systems, has been part of the company for over the past 20 years. He believes that having a great work environment and supportive team, is the ultimate key to success. Since being in the IT realm for over 25 years, Jason, along with Olmec Systems, has been on the Inc. 5000 “List of America’s Fastest Growing Private Companies” and Channel Futures MSP 501 “Top Managed Service Providers in North America,” along with other awards and nominations. Jason earned his Bachelor Degree in Information Systems from the New Jersey Institute of Technology. He also holds certifications in Microsoft MCSE, VMWare VCP, and Cisco CCNA. In his spare time, Jason is a contributor for The Center for Social & Legal Research (Privacy Exchange) and a member of the Morris County Chamber of Commerce. His hobbies include cycling and kayaking. He currently lives in New Jersey with his wife, two daughters and son.

Leave a Reply