Understanding Bring Your Own Device
The proliferation of security measures in response to the introduction of outside device access of your organization’s network is paramount for thorough network security.
In a world where seemingly everyone has a device that they bring everywhere, how can you make this trend work for your business while keeping your IT infrastructure from being infiltrated by malicious entities? By instituting a conscientious and thorough Bring Your Own Device (BYOD) strategy, your company can make your staff’s devices work for your company.
Most business owners would agree that their employees already bring their smartphones to work, and will continue to do so whether your company policy allows them to or not. In fact, according to a study by Microsoft, over 67% of employees at surveyed companies bring their devices to work, regardless of their company’s policy. Based on this statistic, it would seem as if a Bring Your Own Device strategy would be a no-brainer, but there are many other variables to consider. For instance, a major point of contention between network administrators and employees that take advantage of their mobile device’s dynamic computing capabilities is that many mobile device management strategies include an option to wipe-clean a device of a user that has left the company. While this is something that the user would have to agree to, most users would rather remove the company data voluntarily than have their personal device wiped clean. For reasons like this, BYOD is not a cut and dry matter, even for companies that have been doing it since before it was known as BYOD.
In order to begin to design a BYOD policy that works for your company, you will have to determine the necessary elements you are trying to protect, the access employees have to those elements, and how to react when you need to enact the protocols of that policy. The first consideration you should have is whether or not the additional mobility would be of any benefit for your organization. The ability to reach beyond your network and still access all the work-related material can be an indispensable factor for the modern employee. People are busier than ever and often need to multitask just to get by. Facilitating work outside of the workplace has to be a consideration for any business owner looking to expand his or her business.
Conversely, as a business owner you’ll also need to understand what threats the threats that are inherent by allowing foreign devices to access your network, as well as the issues that come with allowing your data, the lifeblood of your business, to be accessible on other networks. With sensitive data breaches costing companies thousands of dollars, can your company sustain itself if you were put in that unenviable position? At ISC, we’ve designed and implemented mobile device management solutions for companies that are searching for ways to improve their portability and use the advanced mobility to enhance production.
Another variable you will have to consider is that of an Acceptable Use Policy. This policy governs what content is available to people on your network. This policy is created with the best interest of the organization in mind, implemented by the network administrator, and policed to the extent required by your organization. In this policy you are able to set forth what is off limits to the end users. The IT professionals at ISC can help you by providing all relevant information so that you can make informed decisions about what content to block and what content to make accessible to maximize your organization’s productivity while keeping your staff’s needs in mind. It’s a connected world we live in and limitations placed on your staff’s ability to receive information, could actually be a hindrance to your organization's productivity.
There are several variables you need to address when designing and implementing your company’s BYOD policy. These include:
1. Specify which devices will be permitted on the network.
2. Establish static and comprehensive security strategy.
3. Define how foreign devices can access data on the network.
4. Ensure staff knows who owns what on the mobile device.
5. Make a decision on what kind of use to ban on foreign devices.
6. Combine your BYOD strategy with your acceptable use strategy.
7. Create a strategy to quickly and securely on board and remove users
The consideration of these variables will go a long way toward concocting a BYOD policy that both fits your organization and ensures that the security of your data isn’t available to be compromised.
At ISC we promote small and medium-sized business efficiency by disseminating expert IT services and support. For more information about our vast array of IT services including comprehensive mobile device management and IT consulting, call us today at 502.292.5097
What Our Clients Say
ISC’s Security Risk Assessment helped our Practice meet our HIPPA Compliance and Meaningful Use requirements and the Advanced Security Assessment and Network Security solutions provide ongoing protection for our Network and Patient Data.
ISC’s IT Consulting, Sourcing and Managed Support Services provides a Total Solution for all our IT needs. They met with us to understand our business, budget and IT requirements. They implemented the solution and their Managed IT Services provide ongoing protection for our supply chain. This allows us to focus on growing our business and serving our customers’ needs. We have peace of mind that our IT is supported and our customer data is protected.
It wasn't until someone called to see if we had an IT service provider that I realized I have used the services of ISC for over 20 years and have relied on their expertise. In a previous job, ISC managed our SQL server and POS system for 30+ stores in 5 states plus our office network. In my present job, they have been there when we expanded from a 3-person office to over a dozen employees across 4 states. We are able to collaborate using Microsoft Office 365 and a virtual private network. The staff is experienced, knowledgeable and extremely helpful. I wouldn't trust anyone else.
As a mid-size manufacturer of custom woodwork our operations are large enough to be complex but too small to justify an internal IT staff. ISC has been an ideal fit for us. Capable, responsive, cost-efficient, and they share our customer-centric values. ISC allows us to focus on what we do best with the peace of mind knowing our IT infrastructure is in good hands.
I am pleased to strongly recommend the team at ISC Kentucky. For years we attempted to support our IT hardware and software installation/upgrade needs internally with limited success. The ISC team effectively assessed our current state, established and executed an improvement plan that covered immediate needs AND projected risks, and have consistently supported our ongoing needs…largely via remote access…in a timely and efficient manner. Partnering with ISC has been clearly one of the best decisions we’ve made for our business…so we can focus on the business.
I could not be more satisfied with ISC Kentucky. They were vital in advising, implementing, and supporting my family medicine practice network. Every time I have needed network support their service was prompt and courteous. I feel that I am a valued customer and they have my best interests in mind.
We have been using ISC Kentucky for almost 2 years. We were in the market looking for an IT company to take care of our needs as a skilled nursing home. One of our board members uses ISC and gave us James Naive as a contact for them. We have been more than satisfied with their work and their knowledge of what we needed and when we needed it. They came in and looked around our building assessed what we had and developed a plan for us to follow to get where we needed to be. I rest much more comfortably knowing that our IT solutions are in their hands. I would highly recommend ISC Kentucky to anyone looking to solve their IT problems. ISC have professional and knowledgeable staff that have handled any situation that we have had in the last 2 years.
As a company we brought in ISC to handle the equipment at our office and 16 locations. They have provided excellent customer service on all levels. They are quick to respond and to resolve any issues. Their office and service staff is efficient, knowledgeable and professional. ISC staff will be instrumental in our planning for the next year. They have been a real asset to our company. We appreciate the relationship and service they have provided.