{"id":8164,"date":"2014-07-22T10:00:30","date_gmt":"2014-07-22T15:00:30","guid":{"rendered":"http:\/\/www.mrc-productivity.com\/blog\/?p=8164"},"modified":"2022-11-22T11:20:46","modified_gmt":"2022-11-22T17:20:46","slug":"5-byod-steps-you-cant-ignore","status":"publish","type":"post","link":"https:\/\/www.mrc-productivity.com\/blog\/2014\/07\/5-byod-steps-you-cant-ignore\/","title":{"rendered":"5 BYOD steps you can\u2019t ignore"},"content":{"rendered":"<p><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/www.mrc-productivity.com\/blog\/wp-content\/uploads\/2010\/11\/Education.jpg\" alt=\"Education\" width=\"76\" height=\"100\" class=\"alignleft size-full wp-image-725\" \/><span style=\"font-size: 14px;\"><em>Summary: Many businesses treat the &#8220;Bring Your Own Device&#8221; (BYOD) movement as a trend&#8211;viewing it as something they can choose to ignore. Learn why this approach is wrong, and the steps every business must take to address this growing phenomenon.           <br \/> <\/em><\/span><br \/>\n<a name=\"20140721\"><\/a><!--more--><br \/>\nGartner has a great tagline on their <span style=\"color: red; font-weight: bold;\">Bring Your Own Device<\/span> (BYOD) page: <em>BYOD is here and you can\u2019t stop it<\/em>.<\/p>\n<p>That simple statement says it all. You see, contrary to what you might hear, BYOD isn&#8217;t a trend. It\u2019s a reality. <\/p>\n<p><figure id=\"attachment_8168\" aria-describedby=\"caption-attachment-8168\" style=\"width: 240px\" class=\"wp-caption alignright\"><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/www.mrc-productivity.com\/blog\/wp-content\/uploads\/2014\/07\/small_11191115075.jpg\" alt=\"photo credit: The Daring Librarian via photopin cc\" width=\"240\" height=\"160\" class=\"size-full wp-image-8168\" \/><figcaption id=\"caption-attachment-8168\" class=\"wp-caption-text\">photo credit: <a href=\"https:\/\/www.flickr.com\/photos\/info_grrl\/11191115075\/\">The Daring Librarian<\/a> via <a href=\"http:\/\/photopin.com\">photopin<\/a> <a href=\"http:\/\/creativecommons.org\/licenses\/by-sa\/2.0\/\">cc<\/a><\/figcaption><\/figure><span style=\"font-size: 14px; line-height: 1.7em;\">What\u2019s the difference? A trend implies uncertainty. Maybe it will catch on. Maybe it won\u2019t. With a trend, you decide whether or not your business jumps on board. <\/p>\n<p>On the flip side, reality doesn&#8217;t offer that luxury. You don\u2019t decide to \u201cjump on board\u201d a reality. It\u2019s happening, whether you like it or not. You adapt, or face the consequences.<\/p>\n<p>That\u2019s exactly what\u2019s happening with BYOD. As employees bring more and more personal devices into the workplace, you can\u2019t stop BYOD. It\u2019s happening. You must adapt. <\/p>\n<p>What should you do? If I can give one piece of advice, it is this: Focus less on restriction, and more on business enablement. How? Here are 5 BYOD steps that you must take:<\/span><\/p>\n<h3>Step 1: Strengthen your network<\/h3>\n<p>As more employee-owned devices make their way into the workplace, the number of devices connecting to your corporate network increases exponentially. If not properly managed, this increase can easily overwhelm your network&#8211;reducing bandwidth and hindering employees ability to work.<\/p>\n<blockquote style=\"line-height: 1.7em; background-image: none; margin-left: 0; padding-left: 18px; height: auto;\"><p>\n\u201cIT personnel must ensure their network architecture can handle increases in Wi-Fi traffic,\u201d says Blake Brannon, Lead Solutions Engineer at <a onclick=\"_gaq.push(['_trackEvent', 'Blog', 'Source', 'AirWatch']); \" href=\"http:\/\/www.air-watch.com\/\" target=\"_blank\" rel=\"noopener\"><span style=\"color: red;font-weight: bold\">AirWatch<\/span><\/a>. \u201cThey must also ensure their existing device management platform can scale to accommodate management of employee devices. If IT has already invested in an EMM system, they should ideally be able to leverage existing policies that have been developed for corporate devices, extending the necessary policies, apps and content from the same console.\u201d\n<\/p><\/blockquote>\n<h3>Step 2: Create clear policies and terms of use<\/h3>\n<p>As businesses enter the world of BYOD for the first time, uncertainty plagues both the users and the organization. What can users do (and not do) with their personal devices? How much control does IT have over personal devices? A clear BYOD policy will help dispel confusion for both users and the business.<\/p>\n<blockquote style=\"line-height: 1.7em; background-image: none; margin-left: 0; padding-left: 18px; height: auto;\"><p>\n\u201cBYOD policies can help employees opt in by outlining both the risks unauthorized access pose and the benefits BYOD programs provide,\u201d explains Brannon. \u201cThe BYOD policy should clearly define the rules of the program, in accordance with government regulations and company security policies. It should also clearly outline what IT will be able to see and manage on personal devices, so there is no fear of personal data being compromised or exposed.\u201d\n<\/p><\/blockquote>\n<h3>Step 3: Teach employees about proper security<\/h3>\n<p>If we\u2019ve learned anything from the recent data breaches, it\u2019s this: Users have awful security habits. As discovered last  year through a <span style=\"color: red; font-weight: bold;\">few breaches<\/span> (which exposed user passwords), the most common password is \u201c123456.\u201d Users have limited knowledge of security risks&#8230;and they\u2019re bringing this into the workplace with their personal devices.<\/p>\n<blockquote style=\"line-height: 1.7em; background-image: none; margin-left: 0; padding-left: 18px; height: auto;\"><p>\n<figure id=\"attachment_7437\" aria-describedby=\"caption-attachment-7437\" style=\"width: 125px\" class=\"wp-caption alignright\"><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/www.mrc-productivity.com\/blog\/wp-content\/uploads\/2014\/01\/small_9530886897.jpg\" alt=\"photo credit: archer10 (Dennis) via photopin cc\" width=\"125\" height=\"188\" class=\"size-full wp-image-7437\" \/><figcaption id=\"caption-attachment-7437\" class=\"wp-caption-text\">photo credit: <a href=\"http:\/\/www.flickr.com\/photos\/archer10\/9530886897\/\">archer10 (Dennis)<\/a> via <a href=\"http:\/\/photopin.com\">photopin<\/a> <a href=\"http:\/\/creativecommons.org\/licenses\/by-sa\/2.0\/\">cc<\/a><\/figcaption><\/figure>&#8220;What we find is that many people have no knowledge of mobile security risks,\u201d says Joe Ferrara, President and CEO, <a onclick=\"_gaq.push(['_trackEvent', 'Blog', 'Source', 'Wombat Security Technologies']); \" href=\"http:\/\/wombatsecurity.com\/\" target=\"_blank\" rel=\"noopener\"><span style=\"color: red;font-weight: bold\">Wombat Security Technologies<\/span><\/a>. &#8220;The first step is to create and communicate policies on mobile devices in the workplace and then provide the assessment and education that help employees understand their risky behaviors and how to protect theirs, and their employer&#8217;s data.&#8221;\n<\/p><\/blockquote>\n<h3>Step 4: Decide how to approach BYOD<\/h3>\n<p>You\u2019ll find two schools of thought surrounding BYOD strategies. One calls for device-level control, while the other calls for data-level control. Here are brief descriptions of each:<\/p>\n<ul style=\"font-size: 14px; line-height: 1.7em;\">\n<li><strong>Strategy 1: The device level<\/strong><br \/>\nWith device-level control, the company adds software to every user device, which lets them control all or parts of the device. Privacy is a major concern with this strategy, as employees aren\u2019t comfortable turning over control of their personal devices to the company. If you choose this route, you must:<\/p>\n<ul style=\"font-size: 14px; line-height: 1.7em;\">\n<li><strong>Give them a choice<\/strong><br \/>\nIf you decide to secure individual employee devices, do so with caution. Forcing all employees into a BYOD program will only push them away. Instead, explain the benefits of joining and let them choose.<\/p>\n<blockquote style=\"line-height: 1.7em; background-image: none; margin-left: 0; padding-left: 18px; height: auto;\"><p>\n\u201cGive employees a choice, instead of requiring all-or-nothing access to their device,\u201d says Lauren Lembo, Director of Business Development at <a onclick=\"_gaq.push(['_trackEvent', 'Blog', 'Source', 'Raxco Software, Inc']); \" href=\"http:\/\/www.raxco.com\/\" target=\"_blank\" rel=\"noopener\"><span style=\"color: red;font-weight: bold\">Raxco Software, Inc<\/span><\/a>. \u201cOffering additional levels of device security in exchange for increasing levels of access to company applications and data allows the employee to retain a sense of control over the process.\u201d<\/p><\/blockquote>\n<\/li>\n<li><strong>Separate personal from company data<\/strong><br \/>\nUsers won\u2019t likely give a company full control over their device. If you do opt for device-level control, make sure you clearly separate business data from personal data, and create clear guidelines as to what the company can and cannot monitor\/control on each device.<\/p>\n<blockquote style=\"line-height: 1.7em; background-image: none; margin-left: 0; padding-left: 18px; height: auto;\"><p>\n\u201cCreating separate spaces, via a data container or partition, for company data lets the employee log into these services to access company data, keeps personal information separate, and allows your IT department to remotely delete company data if needed,\u201d explains Lembo. \u201cBy designating separate spaces, employees can literally see what the company can and cannot access. The clear separation of these two spaces prevents information spillover and makes your employee more comfortable using their personal device for work.\u201d\n<\/p><\/blockquote>\n<\/li>\n<\/ul>\n<\/li>\n<li><strong>Strategy 2: The data level<\/strong><br \/>\nThe problem with securing each device: it requires more effort, and devices constantly change. The second approach bypasses these issues, focusing instead on securing the data. Employees use whichever device they please, and the company grants data access depending on each user\u2019s role.<\/p>\n<blockquote style=\"line-height: 1.7em; background-image: none; margin-left: 0; padding-left: 18px; height: auto;\"><p>\n\u201cThe very idea of &#8220;BYOD control&#8221; is doomed to failure at the outset,\u201d explains Miles Leacy, Managing Principal at <a onclick=\"_gaq.push(['_trackEvent', 'Blog', 'Source', 'The Mac Admin']); \" href=\"http:\/\/themacadmin.com\/\" target=\"_blank\" rel=\"noopener\"><span style=\"color: red;font-weight: bold\">The Mac Admin<\/span><\/a>. \u201cThe goal is not control. These are devices owned by the individual. The goal is to grant them access to the systems and data we need them to access. There is no need to control what isn&#8217;t present. If employee X needs data Y, then we need to grant him\/her access to that data. I don&#8217;t care what else the device does or has resident on it.\u201d\n<\/p><\/blockquote>\n<p>Essentially, this approach treats the device like a doorway, rather than a destination. For instance, companies might make their data available in the form of mobile web apps, with secure logins for each one. Users then login and access that data via their mobile web browser&#8211;without installing anything on the device itself.<\/li>\n<\/ul>\n<h3>Step 5: Embrace your new role<\/h3>\n<p>In the past, IT departments controlled technology because it was scarce, and hard for users to obtain and use. That\u2019s no longer the case. To truly succeed in this technology-driven world, IT must embrace their new role: The technology consultant. No longer the gatekeeper, IT\u2019s new job is helping the business get the most out of the technology they have.<\/p>\n<blockquote style=\"line-height: 1.7em; background-image: none; margin-left: 0; padding-left: 18px; height: auto;\"><p>\n\u201cWith BYOD, IT departments take on a new role as a consultant,\u201d explains Brannon. \u201cThe influx of personal mobile devices into corporate networks &#8211; and the cloud-hosted data they access &#8211; has fundamentally changed the way people work, and by necessary extension, the way IT departments operate. Providing access to multiple device types &#8211; and often to multiple devices per user &#8211; creates a myriad of new challenges for IT departments. IT departments managing BYOD programs are also routinely asked to troubleshoot on a much wider range of devices. Be sure your department is prepared for the influx and diversity of requests from the users.\u201d\n<\/p><\/blockquote>\n<p>So, what do you think? Is there anything you would add to this list? If so, please share your thoughts in the comments.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Summary: Many businesses treat the &#8220;Bring Your Own Device&#8221; (BYOD) movement as a trend&#8211;viewing it as something they can choose to ignore. Learn why this approach is wrong, and the steps every business must take to address this growing phenomenon.<\/p>\n","protected":false},"author":4,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"site-sidebar-layout":"default","site-content-layout":"default","ast-global-header-display":"","ast-main-header-display":"","ast-hfb-above-header-display":"","ast-hfb-below-header-display":"","ast-hfb-mobile-header-display":"","site-post-title":"","ast-breadcrumbs-content":"","ast-featured-img":"","footer-sml-layout":"","theme-transparent-header-meta":"","adv-header-id-meta":"","stick-header-meta":"","header-above-stick-meta":"","header-main-stick-meta":"","header-below-stick-meta":"","slim_seo":{"title":"5 BYOD steps you can\u2019t ignore - mrc&#039;s Cup of Joe Blog","description":"Summary: Many businesses treat the \"Bring Your Own Device\" (BYOD) movement as a trend--viewing it as something they can choose to ignore. Learn why this approac"},"footnotes":""},"categories":[8],"tags":[78],"class_list":["post-8164","post","type-post","status-publish","format-standard","hentry","category-education","tag-byod"],"_links":{"self":[{"href":"https:\/\/www.mrc-productivity.com\/blog\/wp-json\/wp\/v2\/posts\/8164","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.mrc-productivity.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.mrc-productivity.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.mrc-productivity.com\/blog\/wp-json\/wp\/v2\/users\/4"}],"replies":[{"embeddable":true,"href":"https:\/\/www.mrc-productivity.com\/blog\/wp-json\/wp\/v2\/comments?post=8164"}],"version-history":[{"count":6,"href":"https:\/\/www.mrc-productivity.com\/blog\/wp-json\/wp\/v2\/posts\/8164\/revisions"}],"predecessor-version":[{"id":13978,"href":"https:\/\/www.mrc-productivity.com\/blog\/wp-json\/wp\/v2\/posts\/8164\/revisions\/13978"}],"wp:attachment":[{"href":"https:\/\/www.mrc-productivity.com\/blog\/wp-json\/wp\/v2\/media?parent=8164"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.mrc-productivity.com\/blog\/wp-json\/wp\/v2\/categories?post=8164"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.mrc-productivity.com\/blog\/wp-json\/wp\/v2\/tags?post=8164"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}