Date post: | 14-Dec-2014 |
Category: |
Business |
Upload: | coopertechnologiesinc |
View: | 386 times |
Download: | 0 times |
1
Risks and Benefits of Bringing Your Own Device
2
What is BYOD?
The policy Bring Your Own Device (BYOD) permits employees to use their own technical devices such as tablets, laptops, and mobile phones in the workplace.
3
Risks and Concerns
4
Security
• Security issues are risks of BYOD policies because confidential information can easily be compromised when a device is lost or stolen.
• If an employee is terminated, retrieving company data can be complicated since work related data belongs to the company while the device belongs to the former employee.
5
Security
• Downloading mobile apps and moving data across different networks and devices makes company and corporate data vulnerable to leaks and attacks.
• Depending on the type of business and industry you work in, strict regulatory compliance mandates has to be followed if employees use their own devices.
6
Benefits
7
Higher Efficiency
• Rather than depend on company computers and software to get work done, work can be done remotely and away from the office.
• Integrating professional and personal lives is easier and allows greater flexibility to the employee if personal devices are allowed at work.
8
Productivity Gains
• According to a study released by Cisco’s Internet Business Solutions Group, BYOD employees are gaining a global average of 37 minutes of productive time per week, ranging from 81 minutes of productive time per week in the US to 4 minutes of productive time in Germany.
9
Lower Costs to Company
• According to Cisco, companies can save as much as $3,150 annually per employee if they implement a “Comprehensive BYOD,” which is a more strategic BYOD approach that offers greater value
• A German employee with an average yearly salary of $45,000 will achieve $75 in additional productivity for companies while Americans claimed an extra $1,518 if BYOD plans were implemented
10
Solutions
11
Password Protect and Wipe Data Clean
• Enforce strong passcodes and require PIN numbers to ensure that employees are acknowledging responsibility for protecting company data.
• Wipe a device clean if a device is lost or stolen
12
Limit Mobile Apps
• Rather than ban the use of mobile apps, companies should educate their employees about the risks third party applications place on company information.
• Use a Mobile Application Management (MAM) system to allow IT to manage, develop, and control in-house and third party apps within the corporate infrastructure.
13
Conclusion
• Although implementing BYOD policies in the workplace has its risks and benefits, the best way to minimize risks and maximize rewards is to implement a clear, defined policy that is in the best interest for the company and its employees.
14
Choose Cooper Technologies, Inc!
• For driven IT management services and solutions, choose Cooper Technologies, Inc. for technological solutions designed to solve problems efficiently. Visit our website http://coopertechnologies.net/ to learn more about our services!