A Few, Quick BYOD Considerations

Every time you turn around someone is talking about B.Y.O.D. As the current craze, it seems like it’s all anyone in IT can talk about. 

Still in its infancy the B.Y.O.D concept has a lot of companies and influencers “land grabbing” to be the leader in providing a solution that solves the inherent risks when you allow employee devices into the work place.  As we are in the MDM market we have our opinions on some of the top things IT managers need to consider from a management perspective.

One of the things companies need to know is simply what is on each phone that could cause a threat. This can be a bigger concern with Android more than iOS because Android phones are running different versions of its OS. With iOS, if there is a threat from an app then it will likely affect all iOS devices. With Android you need to narrow it down to the phone, OS and where they got the app.

Another consideration is email provisioning and policies, because a lot of security issues come from email. A lot of employees are just connecting to their company’s exchange server, but IT managers need to be proactive and know who is connecting so they can make sure the phone can be wiped if they leave or lose the smartphone/tablet.

Finally, companies should consider creating a policy or some strict requirements for B.Y.O.D. For example, IT should consider banning phones which have been jailbroken. Those phones can introduce more vulnerability into your network, and while it is the employee’s device, it’s still your network.

What considerations would you add? Post them in the comments below, or start a new discussion about this or any mobile ecosystem topic in our LinkedIn group.

Tagged with , , , , , , , ,