BYOD is an IT policy where company employees are
permitted to use their own mobile devices to access organisation data and
systems. This aspect is changing the way IT is acquired, managed, delivered,
and secured. It also helps in understanding why Cloud and Virtualization
technologies are prime enabler of BYOD.
In today’s time , with almost every ‘bring
your own device(BYOD)’ discussion will have some mention of security as it is
still the biggest obstruction keeping employers from completely using their
personal devices inside the office. BYOD enables employees to work on their own
device to access corporate emails, to view documents and so on and there is no
absolute way to completely safeguard each and every device in a BYOD
surrounding. Thus, if not properly regulated, BYOD can hover IT security and
lead company’s critical data systems at risk.
Company needs to consider the following 4
major factors when building BYOD.
Improve
your network
Letting employees to use their personal
devices at work will eventually result in invasion of devices on company’s
network. The next question that arises is whether company network can handle
the increase? It needs to ensure that the network is upgraded to lever the
stress of multiple devices working simultaneously. Many companies have replaced
802.11a/b/g infrastructure with 802.11n and deployed APs for maximum bandwidth
and coverage.
Company needs to take into account cloud
solutions as part of your BYOD plan. Most of us give importance to data
virtualisation and backup storage and overlook the purposes of the cloud
solutions. Also one of the benefits of BYOD for the company is that it provides
flexibility to the employees i.e. it allows people to work from anywhere,
and so company’s cloud solutions must
gauge to account for work outside of physical locations.
Personal
supervising
Many organisations implement different tools
to manage and monitor employee devices, but these devices still belong to the
employees. Companies need to ensure that they do not cross their limits and
claim employees machines as their own by implementing various security software’s
and business application. It is better that company focus at finding solutions
that limit tracking and decrease the inaccuracy while at work.
Building
trust and assigning responsibility
Trust is the most important factor when it
comes to BYOD. Trust is the centre of enterprise security. Employers need to
take more responsibility in a BYOD environment. Every company should ask itself
who it should trust when it comes to company information. Implementing BYOD
policy and giving employees more freedom over company information is surely a
good sign of trust. They need to know what’s expected out of them, and what
legal consequences they might have to face if any critical or confidential
information is leaked. When implementing a BYOD strategy, it’s important to
incorporate who is responsible in broad range of circumstances which will
motivate employees to be cautious of their actions.
Clear
communication
If trust is the base of security, then clear communication
helps to keep everything aligned. Modification at any level needs clear
communication between management and subordinates. Employees need to know ways
to communicate their problems or concerns and get solutions
and at the same time, higher
management should also understand employees concerns and respond to their
questions and avoid misunderstanding. Company needs to ensure that in the
process of building a BYOD strategy, there is a clear communication and
involvement of all employees. It also needs to ensure that new people joining
the organisation understand the policy once implemented in order to avoid any
kind of misunderstanding in expectations.
By incorporating industry chief practices,
building a BYOD policy and implementing approaches that are flexible, companies
will be better prepared to deal with challenges caused by the use of employees’
own devices.
About Author:
Nisha Bhatt is a consultant in Systems Plus Pvt. Ltd. Within Systems Plus, she actively contributes to the areas of Technology and Information Security. She can be contacted at: nisha.bhatt@spluspl.com
Good content network switches suppliers in dubai
ReplyDelete