Skip to main content

The path of progress

A long time ago in a galaxy far away, children used to play in the park, not on their tablets. By extension, businesses were unsupportive of employees using personal technologies for work purposes. Historically, an employee had to use a computer or phone provided by the company, for use by the company and to be accessed by the company without notice. Business and pleasure were not to be mixed, and personal devices were at threat to the status quo.

In the tech galaxy of today’s business world, the approach to employees using their own devices for work has done a U-turn. Since it is difficult to differentiate between professional and personal use, many small to medium size businesses (SMBs) opt for a Bring Your Own Device (BYOD) strategy. A generous SMB may meet the cost of employees’ smartphone, tablet or laptop. The same device is used to Tweet, share images on Facebook, or stream the latest TV shows.

The downside of BYOD

While BYOD has clear advantages, SMBs should exercise caution since the practice means devices have open access to company data and networks. Security and privacy of client and employee data is essential to any business intending to turn a profit and maintain a positive brand reputation.

Managing and monitoring BYOD doesn’t come cheap for the average SMB. Corporations such as Apple or Citigroup won’t bat an eye; they hire IT engineers or develop intricate BYOD policies to enforce data and network security. SMBs, challenged by limited resources and stiff competition, do not possess this luxury.

SMBs and BYOD security

Current research suggests that SMBs are complacent regarding the potential security risks of network hacking and data breach stemming from workplace BYOD. Considering that cybercrime has increased by 20% compared to a year ago, SMBs need to expunge their ‘it’ll never happen to us’ attitude. Knowing that BYOD is here to stay, many SMBs still overlook the reality of the risk it poses to their network and data security.

BYOD in four steps

 To get some peace of mind, SMBs need to implement a substantive BYOD policy before it’s too late and disaster strikes their IT infrastructure in the form of a data breach.

What follows are four essential factors in include in your BYOD policy.

Step 1: Permitted devices

Clearly outline which devices are permitted for use at work and those that are not. You won’t be able to manage and monitor every device on the market, including all the software updates and applications that go along with them.

Step 2: Remote deletion

Your IT engineer, in-house or outsourced through a Managed Service Provider (MSP), must be able to remotely delete any company-sensitive data without the consent of the device owner. Nowadays, remote deletion is sophisticated and company-related data can be erased leaving personal content, including contacts and apps intact.

Step 3: Written policy

With the aid of an MSP, you’ll need to have a written BYOD policy in place. The policy should clearly explain the terms of personal device usage and provide guidelines to remote workers in terms of appropriate use. You should clearly state the repercussions for any policy violation.

Step 4: Employee privacy

Employee privacy needs to be integral to any BYOD policy. Employees will obviously use their devices for checking email, social media posting, online shopping, googling and storing a range of personal files. As such, they will need to accept that employers have access to any content stored on these devices.

Part of your BYOD policy may cover location tracking in the event of a device been lost or stolen. You should be mindful to openly discuss surveillance with your employees; many may be objectionable to this form of intrusion.

Manage BYOD and manage your SMB

Inadequately managed and monitored BYOD will put your network and data at risk of breach. That’s a given. However, like it or not, BYOD is firmly rooted in the business world. So, the best way to dilute the anxiety associated with potential hacking and data loss is to implement a robust BYOD policy. Update the policy as your company expands and grows. Discuss the importance of data security with your employees. Use your MSP to remotely monitor devices and conduct security checks. Do these things and your small business will remain safe and secure.

24/7 MAC & PC SUPPORT

With our unique zero minute response, direct-to-engineer support model we have a 99.9% client retention rate since 2006.

With face to face strategy and account management, we are a trusted extension of your business. We remove the blame shifting culture, by dealing with third-party providers on your behalf and provide simplified jargon-free solutions at predictable rates with our flat free unlimited support and services model.
Some of our clients include Edmond De Rothschild, Smart Meter GB and FMB.

#ZheroIT
#weloveIT
High IT Cost? #ZheroIT
Cyber Security Concern? #ZheroIT

Leave a Reply