Bring your own device (BYOD) is not a new phrase in the IT world. Since the inception of the smartphone, many companies offer their employee’s options to use their own personal devices to work from. In this article, we are going to uncover some important facts about BYOD.
Is BYOD A Good Thing?
Mobile apps allow for simple and better-to-manage solutions in many instances for business owners. There are several reasons why BYOD is important, for example for increased productivity. Employees are likely to increase productivity when they are using a familiar device.
Many companies have a BYOD policy. Aberdeen Cyber Security is giving out our sample today incase you don’t yet have one. There are some key points you need to think about if you do decide to go down the BYOD route.
Reduce Your Business Cost
Another main benefit of BYOD is reduced cost to the business. The upfront cost of purchasing smartphones, line contracts and insurance can be a costly exercise. It’s not only the cost – if there are a fleet of devices and lines. Someone in the business has to manage those devices and the lines. This can be a time-consuming exercise, and it’s one big headache that’s removed if you have a BYOD policy.
Will you be compensating the employee in any way for the use of their personal device for work activities? For example, paying a monthly ‘bonus’ to the employee can compensating the employee. And whilst this bonus may be small, it reduces the headache of managing company devices.
How Exactly Will You Control Company Data On Personal Devices?
For most, there is a simple solution, and that is the ability to manage access to company email on the device. It’s probably the number one thing most people use for business purposes, but what happens when the employee moves on or worse still is asked to leave?
Most email providers like Office365 have you covered. You can lock down access to email through the Office365 admin console. However, your policy must reflect what is going to be controlled on the employee’s device. The employee must comply with any processes you have for data security.
If you would like help exploring how to control and manage company data on employee devices, then please get in touch with Aberdeen Cyber Security on our Contact Page.