4IT Blog

4IT has been serving the Miami area since 2003, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

How Should Business Owners Respond Appropriately to the Mobile Revolution?

How Should Business Owners Respond Appropriately to the Mobile Revolution?

Mobile devices have a prevalent place in the modern office. In fact, a recent study by Gartner found that 80 percent of all employees bring their personal mobile device with them to work. This Bring Your Own Device (BYOD) trend comes with a host of benefits, like improved productivity and employee morale, but it increases the risk of a corporate data breach if not properly managed. How should a concerned business owner respond to this trend?

Mobile devices have a prevalent place in the modern office. In fact, a recent study by Gartner found that 80 percent of all employees bring their personal mobile device with them to work. This Bring Your Own Device (BYOD) trend comes with a host of benefits, like improved productivity and employee morale, but it increases the risk of a corporate data breach if not properly managed. How should a concerned business owner respond to this trend?


The responses we’ve seen over the years is either employers trying to curb it by supplying company devices, or nixing mobile devices altogether. Both of these options have some serious side effects that must be taken into consideration.

I’ll Just Issue Business-Approved Mobile Devices
Depending on the kind of work your employees do, this might be a good perk. You can take serious considerations into the platform (iOS, Android, Windows), contract terms, and how the company will control and protect its data. You can also map out how you will separate work from personal use on the device, clearly lay out what you can do and what the employee can do, what happens if the device is lost, what happens if the employee quits, etc.

The problem with this method is that it’s often seen as a quick fix. Throwing money at this problem and forcing employees to use work-issued devices won’t solve the problem of controlling data without putting together the plan. Plus, while statistics do show that employees aren’t necessarily unhappy with corporate devices, if they feel strong-armed into using a device, the staff who were using their own devices to actually work harder and more effectively might feel slighted. That said, other employees might like the idea of getting a new smartphone on the company’s dime. It’s really going to depend on your employees and company culture.

I’ll Just Ban All Mobile Devices in the Workplace
It’s a big ultimatum: no email access, no file access, no messengers, no note-taking, no mobile devices, period. Anyone caught using a personal device will be penalized or written up. You’ll certainly protect your data this way. Chances are though, you’ll also create agita with staff who were really just trying to do their jobs better. Employees won’t think about the ramifications of lost data, they will just think their boss is making it harder for them to be effective. Fortunately, most employers haven’t resorted to this, but it still happens. Beyond just stirring up emotions, this can drastically set your company back compared to competitors that are welcoming mobility and benefiting from it.

It Sounds Bad, But There are Options
There is a middle-ground between banning devices altogether and enforcing company-issued devices. Policies can be put in place that protects company assets like email and access to data while respecting the privacy of your employees. Employers can push policies - like enforcing users to set up passwords, patterns, or pins to log into the device, grant the ability to revoke access to email, and even wipe the device remotely if it is lost or stolen.

Personal laptops can be granted company antivirus and remote monitoring, or better yet, employers can offer a VPN or hosted desktop solution so they won’t have to worry about the state of the device. The latter can also address other needs such as software licensing and accessing company data while on public Wi-Fi.

4IT Can Help
The best way for a business owner to handle mobile devices in the workplace is to implement a BYOD strategy--one that addresses every security risk while enhancing all the benefits of mobile technology. Every business is different, which is why it’s best to have a consultant like 4IT work with you to develop a BYOD strategy that’s tailored to enhance your company’s goals. Plus, given the security risk inherent in mobile devices, you’ll want an outside perspective to make sure you’re not overlooking anything important.

For professional assistance developing an effective BYOD strategy for your business, give us a call today at 305-278-7100.

 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Sunday, 19 November 2017
If you'd like to register, please fill in the username, password and name fields.

Mobile? Grab this Article!

Qr Code

Tag Cloud

security Tip of the Week Technology Cloud Privacy Best Practices Microsoft software Internet Business Computing Hackers Backup Productivity Hosted Solutions Business Management Managed Service Provider Google Malware IT Services Business Efficiency Windows Disaster Recovery Innovation IT Support Business Continuity Hardware Workplace Tips VoIP User Tips Saving Money Computer Miscellaneous Windows 10 Virtualization Upgrade Mobile Devices Mobile Device Management Data Network Security Server Mobile Computing Alert Email Save Money Microsoft Office Communication Network communications Smartphone Quick Tips Small Business Social Media Information Technology Smartphones BYOD Going Green Mobile Office Android Health Office Apps Application Ransomware Operating System Chrome Browser Managed IT Services Gadgets Outsourced IT Managed IT Holiday Firewall Mobility Avoiding Downtime Disaster Tablet Productivity WiFi Cybercrime Search Cybersecurity Telephone Systems Passwords The Internet of Things Remote Computing Unified Threat Management IT Solutions Risk Management Spam Best Practice BDR Data Management Apple Employer-Employee Relationship VPN Budget Vendor Management Automation Facebook Hacking Hard Drives Saving Time History Remote Monitoring User Error Password Hosted Solution Collaboration Computers Data Recovery Law Enforcement Wireless Technology Recovery Phone System Marketing Data Backup Big Data Office Tips Money Content Filtering iPhone Proactive IT Customer Relationship Management Phishing Virus Lithium-ion battery Vulnerability Work/Life Balance Telephony Current Events Office 365 Bring Your Own Device Printer USB Humor Administration Analytics Encryption Antivirus Wearable Technology Gmail Router Shortcut Social Maintenance Government PowerPoint Data Protection Intranet Users Social Engineering Bandwidth Printer Server Windows 8 Laptop OneNote Private Cloud Trending Education Net Neutrality Politics Personal Information Point of Sale Tech Support IT COnsultant SaaS Data Security Wireless Computer Repair Audit Outlook HaaS Unsupported Software Google Drive Cloud Computing Business Intelligence App Save Time Cost Management Identity Theft IT Support Virtual Reality Solid State Drive Sports Meetings Flexibility Windows 10 Emails Instant Messaging Efficency Samsung HIPAA Wi-Fi Entertainment Benefits Emergency Artificial Intelligence DDoS Computer Accessories Applications Data Storage Compliance Mouse Network Congestion hacker Display Transportation Help Desk Two-factor Authentication Augmented Reality Managing Stress Robot Paperless Office Computer Care Excel Battery Fax Server Automobile End of Support Workplace Travel Streaming Media Internet Exlporer Update Customer Service Uninterrupted Power Supply Biometrics Social Networking online currency Retail Internet of Things Busines Continuity Surge Protector Networking Television Near Field Communication Patch Management Images 3D Printing Employer Employee Relationship Google Maps Uograde Worker Commute Commerce Operating Sysytem Human Resources IT consulting Regulation PDF Files Running Cable Software as a Service Scalability ISP Safety Reliable Computing Sync Text Messaging iOS Chromecast Data Loss How To Bloatware Managed IT Service Programming Blogging Upgrades Adobe Managed IT Services Wiring Computer Fan Administrator Training Google Docs Information Colocation Website Consultant Branding The Blindside Of Licensing Debate Dark Web Access Distributed Denial of Service Company Culture Microsoft Excel Black Market Screen Mirroring OneDrive Touchscreen Amazon IT Security WIndows 7 Inbound Marketing eWaste Co-managed IT Cleaning Storage File Sharing Experience Regulations Cast Keyboard Avoid Downtime Windows 10s Nokia Value Nanotechnology Lifestyle systems Music Cameras Ebay Computing Hiring/Firing User Tablets Hard Disk Drive Root Cause Analysis Data storage Science hack Virtual Desktop Books Presentation HBO Bluetooth Smart Technology Best Available NFL Video Games best practices CrashOverride IT Technicians Cortana Document Management Data Breach IT Management Advertising SharePoint Word Legal data breach Settings Touchpad Mobile Device Legislation Twitter Managed Security WIndows Server 2008 Hard Drive Teamwork Scam Windows Ink risk management Taxes Comparison Microblogging Youtube Specifications Supercomputer Electronic Medical Records Sales Managed Service Provder IT Budget Gift Giving Webinar Reputation Webinar Mobile IT solutions Shadow IT Relocation IT service Professional Services Domains Tutorial Buisness