The Trend of BYOD: How to handle it?

The Trend of BYOD: How to handle it?

Ask these questions to ourselves: how many people have their business email installed on their personal tablets and smart phones? Or, how many people write the minutes of meeting on their laptop? The answer is most people!

With the development of technology, it is undeniable that to have a success business means the ability of companies in enforcing their staffs to be able to access data everywhere, with different devices – corporate owned or personal owned.

The term of BYOD – bring your own devices – is getting more popular nowadays. It refers to people who use their personal laptop, tablet, or mobile phone for business purposes. It looks like the trend of BYOD has become a norm. It is found by EMA (Enterprise Management Associates) 58% of tablet buyers come from personal users, instead of companies. This raises expectation that access point to business application is everywhere, without any limitation that comes from the belonging of devices.

From company point of view, this expectation means increasing employees’ satisfaction, productivity, and reducing the IT devices cost. On the other side, with the free access through personal devices, it means another point of possibility of data lost and IT security concern. For example, a company should think ahead what to do when a smart phone of their employees were stolen. This smart phone must have access to working email and holds company’s data and crucial information. Thus, it is wise for each company to take BYOD trends in a more serious consideration.

A company has to understand that each staffs may have multiple point access of working data. It is important to understand what and how staffs access their devices. With this overview, the next step is to create a security policy of BYOD usage. This can be varied for each company. One company may limit the usage personal devices to executives and managers only, others can provide more IT teams to support and reassured everyone compile the security regulations in the company.

To maximize the security, it is suggested that IT department is able to remotely back-up all information, remove all applications and data when necessary, and restore functionality that can help decrease the risk of data loss.

When staffs want to use their personal devices for business purposes, make sure to use additional security filter (such as passwords, remote access from IT people, etc) when accessing company’s working files. This way, staffs are able to use their personal devices for both personal and business cases.

Last but not least, it is important to well-train our staffs related security issues. Each staffs must be capable for self-service when something is happening with their devices. Socially, security concern has to be implemented in our staffs’ minds so they will not incidentally spill out company’s data. Technically, we can support or teach our staffs on how to use technology in the safer manners.