Subscribe / Unsubscribe Enewsletters | Login | Register

Pencil Banner

5 more post-holiday BYOD strategies and considerations

Steve Ragan | Jan. 3, 2014
Now that the holidays have come and gone, it's time to focus on mitigating the problems associated with employees returning to work with a bevy of new devices.

Just before the Christmas holiday, we offered five strategies the help mitigate post-holiday BYOD problems. Now that employees are returning to work, shiny new devices in hand, here's some additional insight.

For this recap, CSO once again spoke with Jonathan Dale, the Director of Marketing at Fiberlink, a mobile management and security firm recently acquired by IBM. The questions this time around centered on the aftermath of the post-holiday mobile boom, and what IT can do to keep things both secure and easily managed.

Education (it never ends):
As mentioned previously, education is important. Make sure that employees have some kind of a reminder when it comes to corporate policies governing personally owned mobile devices. If there's some type of mobile management solution in place, make sure employees know how to enroll.

Another tip that's good the second time around focuses on proactive education. Remind employees of the steps needed to enable Wi-Fi on their new devices in the office, including the steps needed for iOS and Android. Dont forget to touch basics such as SSID and automatic connections.

Another topic that was covered previously, which still applies, is privacy. Make sure employees know what parts of the device the company has access to, and what can be done with that access.

"Privacy is a major part of a successful BYOD program. There are several options so, know what abilities you as IT have and figure out what works best for your company culture or CEO," Dale said at the time.

Another side to that topic comes from a CSO reader, who commented that their organization has little BYOD enrollment. This is due to the clearly stated fact that on the corporate network, there is no expectation of privacy. In fact, outside of a small user base, their BYOD program is dead.

"Our BYOD policy clearly states there is no expectation of privacy when connected to the corporate network and using corporate systems. Pretty much stops most BYOD adoption dead in it's tracks. The rest that enroll get frustrated with the limited access our BYOD program provides so they opt out after a couple months," the comment explains.

Existing MDM considerations:
Assuming that an MDM solution has already been deployed within the organization, there are a few key considerations that need to be taken into account, including working with, and not against the user.

"How does IT achieve this? They ensure that they have not only prepared and allowed for the new shiny gadgets, they've shown users that they're on their side and are enabling them to the fullest extent," Dale said.

If a mobility management solution exists, then dealing with new devices will mainly be a matter of ensuring that policies assigned to each user or group are right for their specific access level and behavior.


1  2  3  Next Page 

Sign up for CIO Asia eNewsletters.