{"id":5323,"date":"2014-12-01T10:05:10","date_gmt":"2014-11-30T23:05:10","guid":{"rendered":"http:\/\/www.macquarietelecom.com\/?p=5323"},"modified":"2023-03-01T16:41:13","modified_gmt":"2023-03-01T05:41:13","slug":"byod-how-to-safely-manage-mobile-devices-in-your-organisation","status":"publish","type":"post","link":"https:\/\/macquarietechnologygroup.com\/news\/byod-how-to-safely-manage-mobile-devices-in-your-organisation\/","title":{"rendered":"How to Safely Manage Mobile Devices in Your Organisation"},"content":{"rendered":"
Authored by Iynky Maheswaran, Head of Mobility\u00a0<\/strong><\/p>\n Iynky Maheswaran, Head of Mobility – Macquarie Telecom<\/p><\/div>\n Technology has become a permanent staple in everyday living. The lines of work and personal life have become blurred, with employers allowing or requiring employee devices to be used for business purposes. As the shift toward employee empowerment becomes more of a necessity rather than an option, knowing what a BYOD program is and how it can help your company is important.<\/p>\n Companies have a number of reasons why this would work for their organisation, but some of the main reasons are: increased productivity, lower IT costs and spending, lower security risks, work flexibility and enhanced work environment.<\/p>\n Although this can save your company a lot of money, there are a number of protocols that should be in place to have an effective BYOD program. Without a strong infrastructure, company files, client information and internal protocols can quickly become compromised. Here are a few key steps in managing mobile devices within your organisation:<\/p>\n Having a BYOD strategy in place will help explore innovative ways to enhance productivity. A sound business case and goal statement should clearly outline why this makes good business sense and how it can help the company move forward. The strategy should have input from all the stakeholders within the organisation. Creating a cross-business mobility group will address every scenario and need to establish key benchmarks for organisational success.<\/p>\n The mobility group\u2019s scenarios should serve as a blueprint for the creation of a support and operations model. This model should identify and quantify costs and benefits, address hidden costs such as increased data bills and support expansion, and outline potential advantages such as increased recruiting success rates with younger employees to help solidify the strategy for BYOD.<\/p>\n In every new implementation, there is a certain amount of risk. Ask yourself the following questions:<\/p>\n Once you have the answers to these questions, the data gathered from the mobile scenarios should help:<\/p>\n Although there is a high level of risk involved, there are also additional benefits:<\/p>\n Once you have decided a BYOD program is feasible, a flexible, but enforceable policy will protect the company and its employees. Limiting the risk to data accessibility is key in ensuring effective protocols will be outlined and enforced. The BYOD policy should complement the existing security and governance policies, and should address the following:<\/p>\n The implementation of an MDM solution or other management utilities will assist in the management and enforced security protocols on the BYOD. All standing policies should be defined by the risk assessment.<\/p>\n All security protocols should be randomly tested at regular intervals to ensure effectiveness. Assessments should be performed using an integrated testing approach, combining automated tools and manual penetration testing. The testing should be done by a trusted third party that has a proven track record of assessing mobile deployments. Macquarie Telecom recommends assessing the entire implementation, testing the management solution, apps and devices as a whole component. Testing the infrastructural changes that allow the BYOD to connect to the main network through Wi-Fi deployments or VPN endpoints is also a crucial component of ensuring system integrity.<\/p>\n After the implementation, all key performance indicators of the BYOD program should be measured to use as a means of continually improving the protocols and infrastructure. Direct user feedback should be used extensively to identify and resolve areas of improvement.<\/p>\n Giving employees a choice in how they contribute to the work environment can improve morale while positioning your company as a leader in advanced workplace initiatives.<\/p>\n Macquarie Telecom provides a wide range of BYOD solutions for businesses. With one of the most comprehensive selections of enterprise mobility services available, we can help you create a secure, cost effective and productive mobile workforce.<\/p>\nWhy a BYOD program?<\/strong><\/h3>\n
STRATEGY IS KEY<\/strong><\/h4>\n
DEVELOP A SUPPORT AND OPERATIONS MODEL<\/strong><\/h4>\n
ANALYSE THE RISK<\/strong><\/h4>\n
\n
\n
CONSIDER THE BENEFITS<\/strong><\/h4>\n
\n
DEVELOP A BYOD POLICY<\/strong><\/h4>\n
\n
SECURE BYOD DEVICES AND APPLICATIONS<\/strong><\/h4>\n
TESTING AND VERIFICATION OF SECURITY PROTOCOLS<\/strong><\/h4>\n
MEASUREMENT AND BEST PRACTICES<\/strong><\/h4>\n