Top 5 BYOD Blunders When Trying to Realize the Productivity Potential of Workers Bringing Their Own Devices to Work

By: Tech Biz Econ Blog | March 27, 2013 (Featured on Tech Biz Econ Blog)

Blunder # 1 – No pre planning

Some companies just think – ‘oh people are using their cellphones at work, ok let them use the company network and we will see how it goes and deal with the issues as they arise’. Companies that just open their networks to BYOD without a plan will have real security problems, and they will probably issues that will not be easy to fix or deal with as they arise.

You need to ask questions like:

  • Who do we want to use the network?
  • Do we want to control access to data or the network based on job function?
  • Do we have enough network resources for the additional load?

Blunder # 2 – No BYOD policy

A BYOD policy sets the terms and conditions in which an employee may use a device on the network. These policies can state which activities and apps can be used on the network. A good example of a BYOD policy template is here:

Blunder # 3 – Give access to all data

Networks are set-up with different level of access, and can be configured based on a user by user base. Organize your network so data is only accessed by those who really need it, not everyone on the network.

BYOD seems like a big problem, but real productivity gains can be had if BYOD is implemented correctly. Take it in small steps and remember to focus on data and the user. BYOD is the future of IT, but it will take time and effort to implement it correctly.

Blunder # 4 – Device selection

Most people don’t want to be told what phone or tablet they can use, but it does make a difference for security and performance of the network. Do your research, and publish a recommended list of devices that offer the security and network features that are critical to your network maintaining a high security level.

Blunder # 5 – Lost devices

 People lose their phones and tablets all the time. They are often stolen and the phones are then hacked and all data is accessed. Large MDM system allow IT departments to wipe the phones data remotely, and some apps like Tigertext can remote wipe messages as well setting text messages to auto-delete.