Questions to Ask About BYOD – Part 2

Good afternoon! Last week, in Questions to Ask About BYOD – Part 1, we discussed whether or not BYOD will save your company money.

Today, we will look at the second aspect of BYOD that needs to be considered, and is closely related to the IT cost benefits: What security challenges and risks will face your IT folks in a BYOD world? The IT and security challenges are complex and many. What happens when someone’s device is lost? What happens when a CEO becomes a victim of corporate espionage (this is not just paranoia, it actually does happen) and her device is stolen by the competition? How much control can the company have over employees’ devices? There’s obviously a myriad of other security questions that need to be addressed for BYOD security but you get the picture, it’s daunting.

Most experts agree that the single most important element in a BYOD environment is having explicit policies surrounding employee devices. In fact, in a recent article by Muneyb Minhazuddin of Australian-based it’s as important as having a phone number or a quality Web site.

That being said, policies are only effective if they are adhered to and enforced. Penalties for infractions need to be clear, concise and, most importantly, enforced. Sometimes employees make mistakes; sometimes they are outright stupid. When rules are broken there needs to be a clear solution available to fix any problems the infraction may have caused and people need to be reprimanded accordingly.

Even with strong BYOD policies in place keep in mind that the human element tends to really mess things up. Look long and extremely hard before you enter the BYOD arena.


Tagged with , , , , , ,