Then came the digital world. Computers, laptops, tablets and smartphones cost way more than paper clips, so employees still depended on corporate-provided tools.
Now, employees have these devices at home for their own use and depend on them for everything from surfing the web to texting their friends to snapping photos of their kids’ bar mitzvahs. For some, they’re virtual appendages. And because so many employees are familiar with their devices to the point they’re almost one and the same, wouldn’t it be easier (and cheaper) for companies to let their workers “Bring Your Own Device” (BYOD)? However, BYOD brings up the issue of security. What if an outsider becomes privy to sensitive and private insider information? Computers, after all, have been known to get hacked. Also, a lost flash drive can fall into the wrong hands. Security, though, doesn’t have to be overly expensive.
Bring Your Own Device and security
An innovative security provider is Route 1, Inc., a small start-up with two huge clients: the Department of Defense and the Department of Homeland Security. The company uses a patented technology that came with a $30m development price tag. However, it offers small businesses that used BYOD security options for less than $300 per person annually. Each worker receives a MobiKEY in Route 1’s system. This USB-type gadget plugs into a computer and allows the employee to see and information on their work desktop. An employee also can view information on the main office computer without copying data on his or her hard drive. BlackBerry BYOD technology provides a user-friendly method that helps the company and employees user their device without compromising each other. The technology is built into BlackBerry ten smartphones. A BlackBerry Balance user can switch from Personal Space to Work Space with a simple gesture. The Work Space is encrypted, secured and managed. It also keeps crucial company information and apps protected. The employees benefit too because they still have their desired mobile experience. The technology is managed through BlackBerry Enterprise Service 10, which enables multi-platform Enterprise Mobility Management. A console lets the customer manage groups, apps, users, devices and servers. These include those that run on BlackBerry, Android and iOS.
Set parameters
If businesses do implement BYOD, CIO has seven suggestions for making a successful policy.
Specify what devices are allowed;
Devise a strong security policy, such as creating strong passwords;
Define a service policy;
Decide who owns data and apps;
Define what apps will be permitted;
Integrate BYOD with an acceptable use policy; and
Set up an employee exit strategy.
This includes backing up a user’s personal information and photos during the “exit swipe.” CIO reports it’s estimated the number of smartphones used globally will reach 2bn by the end of 2015. With so many people using smartphones, it’s probably a wise business decision for a company to tap into employee’s personal technological habits to benefit the corporate world as well. Vickie May blogs about all things computers, mobile and technology in general.
We use cookies on our website to give you the most relevant experience by remembering your preferences and repeat visits. By clicking “Accept”, you consent to the use of ALL the cookies.
This website uses cookies to improve your experience while you navigate through the website. Out of these cookies, the cookies that are categorized as necessary are stored on your browser as they are essential for the working of basic functionalities of the website. We also use third-party cookies that help us analyze and understand how you use this website. These cookies will be stored in your browser only with your consent. You also have the option to opt-out of these cookies. But opting out of some of these cookies may have an effect on your browsing experience.
Necessary cookies are absolutely essential for the website to function properly. This category only includes cookies that ensures basic functionalities and security features of the website. These cookies do not store any personal information.
Any cookies that may not be particularly necessary for the website to function and is used specifically to collect user personal data via analytics, ads, other embedded contents are termed as non-necessary cookies. It is mandatory to procure user consent prior to running these cookies on your website.