(703) 288-9767    NTC Store
NTConnections Blog

NTConnections has been serving the Reston area since 2003, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Are You Prepared for Employees to Bring Their Own Devices?

Bring Your Own Device policies have helped many companies save money on technology by allowing employees to use their own devices, rather than taking on the cost of providing devices. However, as much as a BYOD approach can help a business financially, there are some potential drawbacks to adopting one that you should be prepared to deal with.

Managing These Mobile Devices
Whenever there is a Bring Your Own Device strategy enacted, there needs to be Mobile Device Management in action as well. Your MDM software also needs to be monitored, as this will inform you if someone without the proper authorization is accessing data that they shouldn’t be.

However, sufficient monitoring is a time-intensive task. It is even possible that it would require you to add an additional employee to properly make use of your MDM software. Before you commit to these measures, which are a must for successfully implementing BYOD, make sure you have (or can obtain) the resources to run them.

One great solution to mitigate your organization’s overall BYOD costs is the built-in automation that many of today’s Mobile Device Management platforms offer. This automation can be customized and run to allow your technicians to focus on the core aspects of your business’ technology rather than spend all of their time, and your money, monitoring employee smartphones.

Streamlining For Support
A major advantage to providing employees with work devices is the control you have over the devices you provide. By selecting a specific model for your employees to use, you can standardize your systems that much more, and make your IT administrator’s job that much easier. By reducing the variety of devices they need to be familiar with, IT can service them more quickly and effectively.

This can be a drawback to BYOD, as it makes support a more arduous task and--as a result--more costly. With a variety of devices and their specific issues, it becomes a more time-intensive task to identify and resolve any problems. Taking this into account, it may be a more cost-effective option to invest in standardized mobile devices for your company to use, rather than try to manage the variety of devices your workforce likely uses based on personal preference. This is a variable that you will need to consider based on your specific circumstances and abilities. Do you finance devices for your staff? Or, manage the varying devices your staff will bring?

Leaving Yourself Vulnerable
Not all devices are equally suited for use in a BYOD strategy--sometimes, a new feature can lead to a pretty severe vulnerability. Take, for example, any device with iOS 11 installed. Despite having switches in its control center to activate and deactivate Wi-Fi and Bluetooth, these switches don’t actually deactivate their connection. This leaves these devices vulnerable, and if they were a part of a BYOD implementation, your business becomes vulnerable, as well.

Wasted Resources
Often, the question isn’t if BYOD makes sense, it’s if BYOD makes sense for a particular employee to have access to. Some companies will reimburse their staff for the personal data that they use. However, if an employee’s responsibilities don’t really require the use of a mobile device, having them involved in a BYOD strategy is akin to paying for their personal use of the device; and, can hinder their overall productivity.

Don’t get us wrong--BYOD can be a great benefit to your business and its bottom line. You just shouldn’t dive in without considering the potential downsides and planning how you will go about solving these problems. The IT professionals at NTConnections can help. To learn more, call us today at (703) 288-9767.

 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Sunday, 19 November 2017

Captcha Image

Mobile? Grab this Article!

QR-Code dieser Seite

Tag Cloud

Security Tip of the Week Technology Cloud Privacy Best Practices Hackers Business Computing Productivity Microsoft Backup Malware Hosted Solutions Internet Google Efficiency Mobile Devices IT Support Business VoIP Miscellaneous IT Services Managed Service Provider Server Business Continuity Workplace Tips Disaster Recovery Network Innovation Data Upgrade Software Hardware Email Communication Computer Windows Save Money Saving Money Business Management Mobile Device Management Microsoft Office Virtualization Browser Smartphones Network Security User Tips Windows 10 WiFi Managed IT Services Smartphone Holiday Android BYOD Social Media communications Operating System Mobile Computing Hacking Small Business Apple Proactive IT Remote Monitoring Avoiding Downtime Computers Cybercrime IT Solutions Chrome Outsourced IT Application Automation Information Technology Passwords Office Marketing Budget Collaboration Ransomware Data Backup The Internet of Things Big Data Alert Quick Tips spam Employer-Employee Relationship Managed IT Services Going Green Mobility Remote Computing Health Bring Your Own Device VPN Recovery Social Engineering iPhone Save Time Firewall Gadgets Managed IT Wireless Technology User Error Cybersecurity Telephone Systems App Vendor Management Antivirus Downtime Private Cloud History Tablet Mouse Analytics Router Retail Memory Redundancy Search Bandwidth Office 365 Compliance IT Support Networking Office Tips PowerPoint Website Gmail Lithium-ion battery Excel Phone System Content Filtering Google Drive Public Cloud Environment Vulnerability Administration Data Security Current Events Phishing How To SaaS Entertainment Running Cable Maintenance Safety Value Skype Government Unified Threat Management Meetings Mobile Office HaaS Customer Relationship Management Fax Server Cloud Computing Black Market Law Enforcement Intranet Best Available Data Management Solid State Drive Two-factor Authentication Data Storage People Internet of Things Artificial Intelligence Programming Word Network Congestion Trending Internet Exlporer Data storage Windows 10 Biometrics Business Owner Apps IT Consultant Humor Statistics Hard Drives Saving Time Data Recovery Facebook Document Management Risk Management Outlook Online Currency Unsupported Software Physical Security DDoS Money Printer BDR Flexibility Robot Settings Software Tips Laptop Scam Distributed Denial of Service Telephony Windows Media Player Print Server Google Docs Virtual Desktop Touchpad IT service Human Resources Relocation Hybrid Cloud Start Menu Virtual Reality Hiring/Firing Training Audit Computer Care Uninterrupted Power Supply Voice over Internet Protocol WIndows 7 HIPAA Domains HBO Net Neutrality Computer Repair Spam Blocking IaaS Mobile Bloatware Customer Service Screen Mirroring Cleaning Multi-Factor Security Managing Stress Frequently Asked Questions LinkedIn Professional Services Virus Entrepreneur Cast Tech Support Lifestyle Tip of the week Hacker Touchscreen Debate Computer Fan Tools Computer Accessories Cost Management Shadow IT Applications Data Protection Wireless Files Windows Server 2008 Science FENG Video Surveillance Productivity Streaming Media Cameras Instant Messaging Consultant Shortcut Business Intelligence Wi-Fi SharePoint Colocation Windows 7 Windows 8 Education Workers Encryption Botnet Printer Server Data Warehousing Bluetooth Sports Monitor Hosted Solution eWaste Computing Infrastructure Regulations Worker Commute Tablets Piracy OneNote Notifications Travel User IT Management USB YouTube Reputation Wearable Technology End of Support Servers Licensing Samsung Social IT Plan Twitter Company Culture NarrowBand Work/Life Balance Customers Internet exploMicrosoft Flash Windows 8.1 Update Root Cause Analysis Crowdfunding Best Practice Software as a Service Social Networking Chromecast Patch Management Advertising Sync Analyitcs Data loss Update Audiobook Knowledge Netflix Charger Scalability Politics Transportation How to Users webinar Benefits PDF Loyalty Keyboard Conferencing Windows 10s Smart Technology Battery Experience Two Factor Authentication Assessment Music Password Television Comparison Troubleshooting Electronic Medical Records Techology Public Computer Specifications Employer Employee Relationship Legal Data Breach Automobile Books Emails CrashOverride Mobile Device IBM Emergency Webinar Worker Supercomputer Content IT solutions Rootkit Video Games