Geeks2U Promise
We guarantee you'll love our fast, friendly service - or we'll refund your money.  
133,572 Happy Customers & Counting
Need tech support?
1300 769 448
Extended hours, 7 days a week
Home  /  geekspeak  /  Watch out for Bring Your Own Disaster

Watch out for Bring Your Own Disaster

Think carefully before you let staff use their personal gadgets for work.

There was a time when people’s work-issued computers and mobile phones were far more powerful than anything they had at home. But not any more. If staff are enjoying the latest and greatest gadgets in their personal lives, it’s likely they’ll be frustrated if their workplace can’t keep up. Expect them to push for a Bring Your Own Device policy, but don’t rush into anything.

If your workplace is considering a BYOD policy, the first step is to assess which devices people want to bring to work and what they want to do with them. Chances are they’ll be keen on smartphones and tablets such as Apple’s iPhone and iPad, or perhaps Android alternatives like the Samsung Galaxy S III and Galaxy Tab.

There was a time when a BYOD policy was as simple as reimbursing staff for work calls made from their mobile phone. But these days they’ll probably want access to their work email, contacts and calendars, and perhaps even business documents and other sensitive data. Once you grant personal devices access to business resources then you obviously need to think about security.

If staff simply want to use an iPad to easily check their email, contacts and calendars then Microsoft’s Exchange and ActiveSync might be up to the task. Many businesses of all sizes run their email on Microsoft Exchange and you’ll find the latest Apple, Android and Windows Phone 7 devices should all talk to an Exchange server. Even RIM’s BlackBerry devices are starting to gain Exchange support. Meanwhile BlackBerry is adding support for Apple and Android devices with BlackBerry Mobile Fusion.

Microsoft’s Exchange and RIM’s don’t just make it easy for staff to access their email. They also make it easy for the business to manage and secure those devices. For example you can force staff to use passcodes to lock their devices, to keep the contents safe from prying eyes. Should a device be lost or stolen, it’s also easy to remotely lock it or even wipe it. This might be comforting in terms of your business security, but it’s little comfort to the staff member who just lost the family photos on their smartphone.

Other mobile security options tend to offer more flexibility, particularly if staff need access to sensitive business documents and IT systems from their handheld gadgets. Some security options create an encrypted “container” which holds documents as well as email, contacts and calendars. Should a problem arise, it’s easy to remotely wipe the secure container without wiping the entire device, so family photos aren’t lost.

The issue of remote wiping cuts to the heart of the BYOD challenge. Once staff use their own devices for work, their security problems become the business’ security problems and vice versa. This is why a successful BYOD program must rely as much on detailed policies as it does on technology. Everyone involved must agree on where the business’ responsibilities for personal devices start and end. Under what circumstances can a device be wiped? What
security precautions must staff take with their devices? Who foots the bill if a device is lost or damaged at work? How do staff keep doing their job if their personal devices are out of action?

These are the kinds of questions which you must address long before you let staff bring their personal gadgets to work, to ensure you don’t have a Bring Your Own Disaster on your hands.


About Author

David Hancock

David Hancock is the founder and managing director of Geeks2U, a national on-site computer repair and support company.

Recent News

Apple typically holds a launch event in September for its new model iPhones. Whenever those new phones launch is when the new versions of its mobile operating systems launch as well. They all used to be called “iOS”, but this now encompasses iPadOS, watchOS, and tvOS. iOS itself covers phones and iPod Touch only. Usually,

Chromebooks are laptops that use Google’s Chrome browser as the basis for their operating system. We’ve discussed them before but to date most of the models sold in Australia have tended to be low cost models pitched at the education market. As a much more controlled computer there’s less that can go wrong with a

When Apple announced recently that it was going to shift from producing computers using Intel processors to its own “Apple Silicon” it also said that it would still produce some Macs with Intel inside over the next couple of years. That’s just what’s happened with the very first Mac Apple’s released since dropping its Apple

We live in an age where it’s absolutely assumed that the vast majority of your interactions with computers will be with visual interfaces – strictly speaking Graphical User Interfaces if you want to get on the jargon bandwagon – but it certainly wasn’t always that way. To get to the touch, voice and mouse-activated interfaces

Coronavirus (COVID-19) Update

Learn about the precautions we are taking and our new contactless pick-up and remote service options. Read More
Get help setting up your home office or homework area today. Learn More