SlideShare ist ein Scribd-Unternehmen logo
1 von 19
Downloaden Sie, um offline zu lesen
How to Do BYOD Right
BYOD:
(Bring Your Own Device)
A trend allowing employees to use their
own personal devices, like smartphones,
tablets and laptops, for work purposes.
of organizations already have mobility
policies in place to accommodate BYOD.
60%
70%of employers reported their
workers’ productivity increased
thanks to BYOD.
Advantages of BYOD include:
Efficiency
Productivity
Employee Satisfaction
Lower Equipment Costs
Accessibility
However, there are some barriers.
Viruses
Data Breaches
Other Risks
Loss of Devices
IT departments tend to fear:
What’s more frightening is that employees
are prone to using personal devices for work,
even without permission and set BYOD
policies. This is certainly risky, but employees
today are desperate to use technology
they are familiar and comfortable with, even
if it’s against the rules.
Do BYOD The Right Way
So why not make rules that accommodate
this employee need, while also addressing
security concerns? Create a BYOD policy.
1. Make sure you know and define the
purpose of your policy.
What are your intentions?
Cost savings? Increased productivity?
Whatever your reason is,
communicate this to your team.
2. Training is important!
While most users already know how to effectively use
their devices, they might not know how to take the
appropriate steps to ensure security. Establish the
best practices of using a personal device for work,
and train employees on data loss prevetion, creating
effective passwords, locking devices, etc.
3. Decide if you want to limit the options.
This is up to your business, but by specifying what
types of devices employees can use, support and
security become much easier. You can also keep a list
of which devices and users are permitted to access
corporate information to better monitor activity.
4. Decide whether or not your IT department
services personal devices.
This adds more responsibility to the IT team, and
requires knowledge of all sorts of devices, but it also
keeps things in-house.
5. With personal devices comes personal
data. Know who owns what!
You must create expectations about having
personal content on a device used for work, in case
it’s lost or stolen and needs to be wiped. Additionally,
decide whether or not corporate data can be stored
on a device’s hard drive.
6. Decide and define how you will control user
access to corporate information.
Will you establish which apps, programs, services
and websites your employees can use? Will you
create levels of access within your environment?
Whatever you decide, communicate this to your
employees and then stick to it.
7. What are the consequences?
These are rules, so you need to decide how to
address rulebreakers. Make sure employees know
they will be held accountable for straying from
the BYOD policy.
8. Have an exit strategy.
You want to make sure that employees who leave the
job don’t take your corporate data with them! Create
specific procedures, which might include removing
their network access, wiping devices, etc.
BYOD addresses the rising need
for employees to be mobile
and more productive.
They will appreciate the ability to customize
how and where they work. With a BYOD
policy, businesses will rest easier knowing
there’s a level of transparency and specific rules
to point to when employees have questions.
By clearly communicating company
BYOD policies, a business will build
trust and good rapport with
employees while ensuring that
company information remains safe.
How to Do BYOD Right

Weitere ähnliche Inhalte

Was ist angesagt?

BYOD- A Productivity Catalyst
BYOD- A Productivity CatalystBYOD- A Productivity Catalyst
BYOD- A Productivity Catalyst
Packet One
 
BYOD: Implementation and Security Issues
BYOD: Implementation and Security IssuesBYOD: Implementation and Security Issues
BYOD: Implementation and Security Issues
Harsh Kishore Mishra
 
IS3101 Tutorial Task 2
IS3101 Tutorial Task 2IS3101 Tutorial Task 2
IS3101 Tutorial Task 2
J M
 

Was ist angesagt? (20)

BYOD
BYODBYOD
BYOD
 
Preparing an Effective BYOD or Mobility Strategy
Preparing an Effective BYOD or Mobility StrategyPreparing an Effective BYOD or Mobility Strategy
Preparing an Effective BYOD or Mobility Strategy
 
Bring Your Own Device 2014 TeamMate User Conference Palm Desert California
Bring Your Own Device 2014 TeamMate User Conference Palm Desert CaliforniaBring Your Own Device 2014 TeamMate User Conference Palm Desert California
Bring Your Own Device 2014 TeamMate User Conference Palm Desert California
 
BYOD- A Productivity Catalyst
BYOD- A Productivity CatalystBYOD- A Productivity Catalyst
BYOD- A Productivity Catalyst
 
BYOD: Implementation and Security Issues
BYOD: Implementation and Security IssuesBYOD: Implementation and Security Issues
BYOD: Implementation and Security Issues
 
BYOD: Bring Your Own Device Implementation and Security Issues
BYOD: Bring Your Own Device Implementation and Security IssuesBYOD: Bring Your Own Device Implementation and Security Issues
BYOD: Bring Your Own Device Implementation and Security Issues
 
Byod
ByodByod
Byod
 
Bring Your Own Device (BYOD)
Bring Your Own Device (BYOD)Bring Your Own Device (BYOD)
Bring Your Own Device (BYOD)
 
Bring Your Own Device (BYOD)
Bring Your Own Device (BYOD)Bring Your Own Device (BYOD)
Bring Your Own Device (BYOD)
 
Risks and Benefits of Bringing Your Own Device
Risks and Benefits of Bringing Your Own Device Risks and Benefits of Bringing Your Own Device
Risks and Benefits of Bringing Your Own Device
 
An Introduction on Design and Implementation on BYOD and Mobile Security
An Introduction on Design and Implementation on BYOD and Mobile SecurityAn Introduction on Design and Implementation on BYOD and Mobile Security
An Introduction on Design and Implementation on BYOD and Mobile Security
 
DLP solution - InDefend in WFH Situations
DLP solution - InDefend in WFH SituationsDLP solution - InDefend in WFH Situations
DLP solution - InDefend in WFH Situations
 
ACT 2014 Business or Pleasure the Challenges of Bring Your Own Device Policie...
ACT 2014 Business or Pleasure the Challenges of Bring Your Own Device Policie...ACT 2014 Business or Pleasure the Challenges of Bring Your Own Device Policie...
ACT 2014 Business or Pleasure the Challenges of Bring Your Own Device Policie...
 
Business Case Of Bring Your Own Device[ BYOD]
Business Case Of Bring Your Own Device[ BYOD] Business Case Of Bring Your Own Device[ BYOD]
Business Case Of Bring Your Own Device[ BYOD]
 
BYOD SCOPE: A Study of Corporate Policies in Pakistan
BYOD SCOPE: A Study of Corporate Policies in PakistanBYOD SCOPE: A Study of Corporate Policies in Pakistan
BYOD SCOPE: A Study of Corporate Policies in Pakistan
 
BYOD: Six Essentials for Success
BYOD: Six Essentials for SuccessBYOD: Six Essentials for Success
BYOD: Six Essentials for Success
 
Mobile Device Managment
Mobile Device Managment Mobile Device Managment
Mobile Device Managment
 
IS3101 Tutorial Task 2
IS3101 Tutorial Task 2IS3101 Tutorial Task 2
IS3101 Tutorial Task 2
 
BYOD Security
BYOD SecurityBYOD Security
BYOD Security
 
Enterprise Mobile Device Management (MDM)
Enterprise Mobile Device Management (MDM)Enterprise Mobile Device Management (MDM)
Enterprise Mobile Device Management (MDM)
 

Andere mochten auch

[WeFocus] 사물인터넷 특허전략 김성현 20151208_티노스_v2
[WeFocus] 사물인터넷 특허전략 김성현 20151208_티노스_v2[WeFocus] 사물인터넷 특허전략 김성현 20151208_티노스_v2
[WeFocus] 사물인터넷 특허전략 김성현 20151208_티노스_v2
Luke Sunghyun Kim
 

Andere mochten auch (7)

[태블릿코드] 모바일 디바이스의 진화, 태블릿에 길을 묻다
[태블릿코드] 모바일 디바이스의 진화, 태블릿에 길을 묻다[태블릿코드] 모바일 디바이스의 진화, 태블릿에 길을 묻다
[태블릿코드] 모바일 디바이스의 진화, 태블릿에 길을 묻다
 
[WeFocus] 사물인터넷 특허전략 김성현 20151208_티노스_v2
[WeFocus] 사물인터넷 특허전략 김성현 20151208_티노스_v2[WeFocus] 사물인터넷 특허전략 김성현 20151208_티노스_v2
[WeFocus] 사물인터넷 특허전략 김성현 20151208_티노스_v2
 
It trends 2015 3 q-totoro4
It trends 2015 3 q-totoro4It trends 2015 3 q-totoro4
It trends 2015 3 q-totoro4
 
Adobe Q2 2016 TV Everywhere Report
Adobe Q2 2016 TV Everywhere ReportAdobe Q2 2016 TV Everywhere Report
Adobe Q2 2016 TV Everywhere Report
 
2016 Adobe Digital Insights Gaming Report
2016 Adobe Digital Insights Gaming Report2016 Adobe Digital Insights Gaming Report
2016 Adobe Digital Insights Gaming Report
 
Tracxn Research - Smart Homes Landscape, November 2016
Tracxn Research - Smart Homes Landscape, November 2016Tracxn Research - Smart Homes Landscape, November 2016
Tracxn Research - Smart Homes Landscape, November 2016
 
The 2016 CES Report: The Trend Behind the Trend
The 2016 CES Report: The Trend Behind the TrendThe 2016 CES Report: The Trend Behind the Trend
The 2016 CES Report: The Trend Behind the Trend
 

Ähnlich wie How to Do BYOD Right

Ten Commandments of BYOD
Ten Commandments of BYODTen Commandments of BYOD
Ten Commandments of BYOD
K Singh
 
Maa s360 10command_ebook-bangalore
Maa s360 10command_ebook-bangaloreMaa s360 10command_ebook-bangalore
Maa s360 10command_ebook-bangalore
IBM Software India
 
Maa s360 10command_ebook-bangalore[1]
Maa s360 10command_ebook-bangalore[1]Maa s360 10command_ebook-bangalore[1]
Maa s360 10command_ebook-bangalore[1]
IBM Software India
 
OC CIO Roundtable BYOD
OC CIO Roundtable BYODOC CIO Roundtable BYOD
OC CIO Roundtable BYOD
Jim Sutter
 
Securing Mobile Devices in the Workplace - Six Tips For Midsize Businesses
Securing Mobile Devices in the Workplace - Six Tips For Midsize BusinessesSecuring Mobile Devices in the Workplace - Six Tips For Midsize Businesses
Securing Mobile Devices in the Workplace - Six Tips For Midsize Businesses
MidmarketIBM
 

Ähnlich wie How to Do BYOD Right (20)

Ten Commandments of BYOD
Ten Commandments of BYODTen Commandments of BYOD
Ten Commandments of BYOD
 
Maa s360 10command_ebook-bangalore
Maa s360 10command_ebook-bangaloreMaa s360 10command_ebook-bangalore
Maa s360 10command_ebook-bangalore
 
Maa s360 10command_ebook-bangalore[1]
Maa s360 10command_ebook-bangalore[1]Maa s360 10command_ebook-bangalore[1]
Maa s360 10command_ebook-bangalore[1]
 
BYOD Blue Paper
BYOD Blue PaperBYOD Blue Paper
BYOD Blue Paper
 
BYOD
BYODBYOD
BYOD
 
Leveraging byod
Leveraging byodLeveraging byod
Leveraging byod
 
BYOD is Happening. Here's How to Make the Most of It
BYOD is Happening. Here's How to Make the Most of ItBYOD is Happening. Here's How to Make the Most of It
BYOD is Happening. Here's How to Make the Most of It
 
OC CIO Roundtable BYOD
OC CIO Roundtable BYODOC CIO Roundtable BYOD
OC CIO Roundtable BYOD
 
OC CIO BYOD
OC CIO BYODOC CIO BYOD
OC CIO BYOD
 
PACE-IT, Security+ 4.2: Mobile Security Concepts and Technologies (part 2)
PACE-IT, Security+ 4.2: Mobile Security Concepts and Technologies (part 2)PACE-IT, Security+ 4.2: Mobile Security Concepts and Technologies (part 2)
PACE-IT, Security+ 4.2: Mobile Security Concepts and Technologies (part 2)
 
5 Steps to Successful BYOD Implementation
5 Steps to Successful BYOD Implementation5 Steps to Successful BYOD Implementation
5 Steps to Successful BYOD Implementation
 
Ravi Namboori Equinix on BYOD Security Risks
Ravi Namboori Equinix on BYOD Security RisksRavi Namboori Equinix on BYOD Security Risks
Ravi Namboori Equinix on BYOD Security Risks
 
08 pdf show-239
08   pdf show-23908   pdf show-239
08 pdf show-239
 
Bring Your Own Device is a disruptive phenomenon that is a significant IT trend
Bring Your Own Device is a disruptive phenomenon that is a significant IT trendBring Your Own Device is a disruptive phenomenon that is a significant IT trend
Bring Your Own Device is a disruptive phenomenon that is a significant IT trend
 
Securing Mobile Devices in the Workplace - Six Tips For Midsize Businesses
Securing Mobile Devices in the Workplace - Six Tips For Midsize BusinessesSecuring Mobile Devices in the Workplace - Six Tips For Midsize Businesses
Securing Mobile Devices in the Workplace - Six Tips For Midsize Businesses
 
Exploring byod approaches for mobile learning
Exploring byod approaches for mobile learningExploring byod approaches for mobile learning
Exploring byod approaches for mobile learning
 
Bring your own device guidance
Bring your own device guidanceBring your own device guidance
Bring your own device guidance
 
No byod policy? Time to grasp the nettle
No byod policy? Time to grasp the nettleNo byod policy? Time to grasp the nettle
No byod policy? Time to grasp the nettle
 
Did you Issue Smartphones to all of your Employees? Here are Two Reasons you ...
Did you Issue Smartphones to all of your Employees? Here are Two Reasons you ...Did you Issue Smartphones to all of your Employees? Here are Two Reasons you ...
Did you Issue Smartphones to all of your Employees? Here are Two Reasons you ...
 
Wondering About the "Bring Your Own Device to Work" Trend?
Wondering About the "Bring Your Own Device to Work" Trend?Wondering About the "Bring Your Own Device to Work" Trend?
Wondering About the "Bring Your Own Device to Work" Trend?
 

Mehr von CloudUniversity

Mehr von CloudUniversity (8)

You Use the Cloud Every Day
You Use the Cloud Every DayYou Use the Cloud Every Day
You Use the Cloud Every Day
 
Scaling in the Cloud: When you Grow, the Cloud Grows
Scaling in the Cloud: When you Grow, the Cloud GrowsScaling in the Cloud: When you Grow, the Cloud Grows
Scaling in the Cloud: When you Grow, the Cloud Grows
 
Multitenant, Dedicated or Hybrid
Multitenant, Dedicated or HybridMultitenant, Dedicated or Hybrid
Multitenant, Dedicated or Hybrid
 
I've Got 99 Problems, But My Infrastructure Ain't One
I've Got 99 Problems, But My Infrastructure Ain't OneI've Got 99 Problems, But My Infrastructure Ain't One
I've Got 99 Problems, But My Infrastructure Ain't One
 
How to Choose the Right Cloud
How to Choose the Right CloudHow to Choose the Right Cloud
How to Choose the Right Cloud
 
10 Reasons to Move to the Cloud
10 Reasons to Move to the Cloud10 Reasons to Move to the Cloud
10 Reasons to Move to the Cloud
 
Cloud Computing Stats - Cloud in the Enterprise
Cloud Computing Stats - Cloud in the EnterpriseCloud Computing Stats - Cloud in the Enterprise
Cloud Computing Stats - Cloud in the Enterprise
 
5 Mysteries of the Cloud Revealed
5 Mysteries of the Cloud Revealed5 Mysteries of the Cloud Revealed
5 Mysteries of the Cloud Revealed
 

Kürzlich hochgeladen

CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Service
giselly40
 

Kürzlich hochgeladen (20)

From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Service
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CV
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
Advantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessAdvantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your Business
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 

How to Do BYOD Right

  • 1. How to Do BYOD Right
  • 2. BYOD: (Bring Your Own Device) A trend allowing employees to use their own personal devices, like smartphones, tablets and laptops, for work purposes.
  • 3. of organizations already have mobility policies in place to accommodate BYOD. 60%
  • 4. 70%of employers reported their workers’ productivity increased thanks to BYOD.
  • 5. Advantages of BYOD include: Efficiency Productivity Employee Satisfaction Lower Equipment Costs Accessibility
  • 6. However, there are some barriers. Viruses Data Breaches Other Risks Loss of Devices IT departments tend to fear:
  • 7. What’s more frightening is that employees are prone to using personal devices for work, even without permission and set BYOD policies. This is certainly risky, but employees today are desperate to use technology they are familiar and comfortable with, even if it’s against the rules.
  • 8. Do BYOD The Right Way So why not make rules that accommodate this employee need, while also addressing security concerns? Create a BYOD policy.
  • 9. 1. Make sure you know and define the purpose of your policy. What are your intentions? Cost savings? Increased productivity? Whatever your reason is, communicate this to your team.
  • 10. 2. Training is important! While most users already know how to effectively use their devices, they might not know how to take the appropriate steps to ensure security. Establish the best practices of using a personal device for work, and train employees on data loss prevetion, creating effective passwords, locking devices, etc.
  • 11. 3. Decide if you want to limit the options. This is up to your business, but by specifying what types of devices employees can use, support and security become much easier. You can also keep a list of which devices and users are permitted to access corporate information to better monitor activity.
  • 12. 4. Decide whether or not your IT department services personal devices. This adds more responsibility to the IT team, and requires knowledge of all sorts of devices, but it also keeps things in-house.
  • 13. 5. With personal devices comes personal data. Know who owns what! You must create expectations about having personal content on a device used for work, in case it’s lost or stolen and needs to be wiped. Additionally, decide whether or not corporate data can be stored on a device’s hard drive.
  • 14. 6. Decide and define how you will control user access to corporate information. Will you establish which apps, programs, services and websites your employees can use? Will you create levels of access within your environment? Whatever you decide, communicate this to your employees and then stick to it.
  • 15. 7. What are the consequences? These are rules, so you need to decide how to address rulebreakers. Make sure employees know they will be held accountable for straying from the BYOD policy.
  • 16. 8. Have an exit strategy. You want to make sure that employees who leave the job don’t take your corporate data with them! Create specific procedures, which might include removing their network access, wiping devices, etc.
  • 17. BYOD addresses the rising need for employees to be mobile and more productive. They will appreciate the ability to customize how and where they work. With a BYOD policy, businesses will rest easier knowing there’s a level of transparency and specific rules to point to when employees have questions.
  • 18. By clearly communicating company BYOD policies, a business will build trust and good rapport with employees while ensuring that company information remains safe.