Geeks2U Promise
We guarantee you'll love our fast, friendly service - or we'll refund your money.  
133,572 Happy Customers & Counting
Need tech support?
1300 769 448
Extended hours, 7 days a week
Home  /  geekspeak  /  Watch out for Bring Your Own Disaster

Watch out for Bring Your Own Disaster

Word Cloud "BYOD - Bring Your Own Device"

Think carefully before you let staff use their personal gadgets for work.

There was a time when people’s work-issued computers and mobile phones were far more powerful than anything they had at home. But not any more. If staff are enjoying the latest and greatest gadgets in their personal lives, it’s likely they’ll be frustrated if their workplace can’t keep up. Expect them to push for a Bring Your Own Device policy, but don’t rush into anything.

If your workplace is considering a BYOD policy, the first step is to assess which devices people want to bring to work and what they want to do with them. Chances are they’ll be keen on smartphones and tablets such as Apple’s iPhone and iPad, or perhaps Android alternatives like the Samsung Galaxy S III and Galaxy Tab.

There was a time when a BYOD policy was as simple as reimbursing staff for work calls made from their mobile phone. But these days they’ll probably want access to their work email, contacts and calendars, and perhaps even business documents and other sensitive data. Once you grant personal devices access to business resources then you obviously need to think about security.

If staff simply want to use an iPad to easily check their email, contacts and calendars then Microsoft’s Exchange and ActiveSync might be up to the task. Many businesses of all sizes run their email on Microsoft Exchange and you’ll find the latest Apple, Android and Windows Phone 7 devices should all talk to an Exchange server. Even RIM’s BlackBerry devices are starting to gain Exchange support. Meanwhile BlackBerry is adding support for Apple and Android devices with BlackBerry Mobile Fusion.

Microsoft’s Exchange and RIM’s don’t just make it easy for staff to access their email. They also make it easy for the business to manage and secure those devices. For example you can force staff to use passcodes to lock their devices, to keep the contents safe from prying eyes. Should a device be lost or stolen, it’s also easy to remotely lock it or even wipe it. This might be comforting in terms of your business security, but it’s little comfort to the staff member who just lost the family photos on their smartphone.

Other mobile security options tend to offer more flexibility, particularly if staff need access to sensitive business documents and IT systems from their handheld gadgets. Some security options create an encrypted “container” which holds documents as well as email, contacts and calendars. Should a problem arise, it’s easy to remotely wipe the secure container without wiping the entire device, so family photos aren’t lost.

The issue of remote wiping cuts to the heart of the BYOD challenge. Once staff use their own devices for work, their security problems become the business’ security problems and vice versa. This is why a successful BYOD program must rely as much on detailed policies as it does on technology. Everyone involved must agree on where the business’ responsibilities for personal devices start and end. Under what circumstances can a device be wiped? What
security precautions must staff take with their devices? Who foots the bill if a device is lost or damaged at work? How do staff keep doing their job if their personal devices are out of action?

These are the kinds of questions which you must address long before you let staff bring their personal gadgets to work, to ensure you don’t have a Bring Your Own Disaster on your hands.

FacebookTwitterGoogle+Share

About Author

David Hancock

David Hancock is the founder and managing director of Geeks2U, a national on-site computer repair and support company.

Recent News

pc-clean

Most people, if given the choice, will try to skip out on doing the evening dishes, or for that matter even loading a dishwasher. It’s not exactly the most thrilling of chores to undertake, but if you don’t clean your dishes somehow, everything ends up dirty and unusable. It’s much the same story for your… More 

fb

Facebook is a service beloved by many, because it makes it so very easy to keep in touch with friends, family, acquaintances and more in an environment that’s generally easy to use and that can be quite fun. It’s one of the world’s busiest web sites, and one of the tech world’s most valuable companies…. More 

browsers

The chances are good that when you browse the web, you’re doing so via Google’s own particular browser, Google Chrome. Chrome has anywhere between 47% to 60% of the browser market sewn up. That might not seem that impressive, but the next largest market share is usually given to Apple’s Safari browser at between 13%… More 

mackeyboarda

Apple sells itself as a premium brand, both in style terms, but also for the quality of the computing equipment it sells. That’s a proposition that can very much become quasi-religious for some folks, although few would suggest that Apple sells bad computing equipment. Wherever you sit on that spectrum, there’s no doubting that consumers… More