Network securityNearly half of all companies have a BYOD policy, and more are making the switch every day. Allowing employees to use their personal devices (smartphones, tablets, laptops) for work responsibilities can result in increased productivity… and increased security concerns.  We are sharing a post today from our partner at Informs, Inc. that presents 3 questions companies should consider before implementing a BYOD policy, or when revamping the one in place:

    1. Is your IT department equipped to handle a variety of devices?  With each individual employee bringing in their own device, your IT department will need to be prepared to properly configure the applications and software used by each employee.  With a wide variety of devices and operating systems to accommodate, IT needs to determine not only which users get access to corporate information, but also how to provide access for employees both local and remote. They also need to be able to provide troubleshooting assistance for these different devices. This can take more time and create more work for your IT department than it would to issue employees standard devices.
    2. Are the devices equipped with the proper security? Employees will need to access the company network, applications, and data, which probably contain confidential information. It’s important that this information is kept safe when employees leave the office. There may also be security measured dictated by your company’s compliance requirements. For example, under the Health Insurance Portability and Accountability Act (HIPAA), devices might need the ability to delete data remotely if disconnected from the network.
    3. Are the devices suitable for the workplace? In certain environments, like warehouses, field service, and even hospitals, there’s a good chance a consumer-grade device just won’t survive. If there is a chance the device will be dropped, taken out in the rain, or run over by some large piece of equipment, it’s best to choose a rugged device for use in the workplace. This will save employees and employers the hassle of replacing devices that fail in improper environments.

Of course, even if you aren’t sure about the questions above, there are still ways to implement BYOD. Does your IT department just not have the extra time they’ll need? Look into a managed services offering. Don’t have the security you need? Check out what wireless LAN can do. Not sure about rugged devices? Ultimately, every company will need to weigh the pros and cons before making a decision when it comes to BYOD.

Regardless of what decisions you make on BYOD, having network security guidelines is paramount to any deployment of new devices or applications.

Learn more about our Data Security Product Suite

Click to edit your new post…

cyber ready

Why Cyber-Ready Now is Not Enough

We frequently discuss and stress the importance of protecting your digital assets today. Across the country, this is becoming more important to busine ...
business in trouble

How to Protect Your Business Before It’s Too Late

IT security consists of multiple facets and is crucial in today’s deeply digitized world. As a business owner, your IT components—the sensitiv ...
business continuity disaster recovery

Disaster Protection: Why Your Business Needs BCDR Now

Disasters sometimes strike. They can take on many forms (fire, hurricane, earthquake, theft, etc.) and either be localized or fully global. The COVID- ...