BYOD: BRING YOUR OWN DEVICE

So bring your own device is exactly what it sounds like, you allow employees to bring their personal devices to be used on the corporate network.   BYOD’s main objective is to increase productivity while reducing costs.  The BYOD model can be a great asset to an organization, although due diligence is required to ensure the devices operate securely.

Advantages

BYOD can be advantageous for reasons such as :

  • Flexibility- Users have the device wherever they go and can complete work on the go
  • Reduced costs- Since the user has already paid for the device hardware costs will be reduced
  • User training – There will be no user training required due to the user using their personal device

Disadvantages

BYOD has many pros but it has cons such as:

  • Lost Device- What happens if the device is lost or stolen?
  • Data Separation – How can you ensure the data is kept separate from personal information?
  • Security – How can the device be secured at all times to prevent a breach?

Sometimes the BYOD model is more expensive to implement as well.  Having software that is compatible with MAC, Windows, Andriod, iPhone, and Linux can become costly.

BYOD Implementation 

To have a successful BYOD implementation you must have a solid BYOD policy.  This policy should cover things such as:

  • Sandboxing – Keeping corporate data separate from personal.
  • Anti-malware – All devices should have anti-malware programs to prevent viruses
  • Passcodes- All devices should have device security such as passcodes, pins or biometrics.
  • Remote wipe – All devices should be able to be wiped remotely if lost or stolen.

Would you implement BYOD in your organization?

If a standard BYOD model will not work for you here few deployment models.

COPE – Corporate owned personally enabled devices are bought by the company and used by the employee for work and personal

Corporate owned – In this model, the device is owned by the company and cannot be used for personal use.

VMI – Virtual Mobile Infrastructure runs all applications in the cloud and just uses the mobile device to access the applications.

Learn more about security and BYOD by creating a free Master I.T. account.  See you in class!

Leave a Reply

Discover more from MASTER I.T. TECH TIPS

Subscribe now to keep reading and get access to the full archive.

Continue reading