Download - Byod final (2)
IT SUPPORT & SOLUTIONS FOR WESTERN CANADIAN BUSINESSES
Bring Your Own Device Your strategy starts here…
Agenda• What is BYOD and why are we talking about it?• The impact on your organization• Our recommended approach• Developing a BYOD policy• Next steps
What Does It Mean?
Bring Your Own Device (BYOD) according to the Great God – Wikipedia
refers to employees bringing personally-owned mobile devices to their place of work, and using them to access privileged company resources.
What is this all about?• Why are they doing it?• History• Motivation – theirs / yours • Flexible: yes or no? • Research
What are the Benefits?• Your People– Employee satisfaction increases– Work life balance vs work life blending– Everyone gets the use of new, cutting edge
technology– Empowered Teams
What are the Benefits?• Your Costs– Reduces the TCO for the business– Lower communication costs– Lower support costs– Lower training costs
What are the Benefits?• Your Operation– Increased productivity– Increased employee efficiency– One less technology to worry about– Maybe even become more competitive
What are the Risks?• Security– Wireless network security– Lack of control over devices used– Protecting sensitive business data– Industry legislated compliancy
What are the Risks?• Other network concerns– The Devices themselves – Manually provisioning devices– Network Saturation– Cost– Potential interruption of daily business activities
What are the Risks?• People– Disgruntled with company not providing newest
technology– Employee stealing information– HR, Finance and Legal implications of personal
data loss– Productivity - Employees using company time on
personal social media
So, why address BYOD with a policy?
• Benefits for your people, your costs, and your operation
• Mitigate the risks to your security, network and your people
• And, employees will use their devices anyway!
Recommended Approach
Create a BYOD Policy
Upgrade IT – Security & other Infrastructure
Onboard employee personal devices
BYOD Policy• Keep it simple!– Security – Support– Acceptable Usage– Financial Management– Governance
• Understand and Balance the Benefits
SecurityYour acceptance of the level of risk will be dependent on the
trust level between your business and its team members, partners and guests.
• First of all; who can participate?• A secure IT infrastructure is needed to enforce
the policy– Mobile Device Management– Network Security– Application Security– Remote Desktop – Wireless Security
SupportWho will be on the hook for supporting personal mobile
devices?• Support costs– Technical support– Acceptable usage training for employees– Technical training for your IT department
• What devices are allowed for BYOD?• The network they connect with
Acceptable UsageEven though this is your personal device what is considered
acceptable usage while connected to your business network or applications?
• Does your business have an Acceptable Usage Policy? (not just BYOD, but in general)
• Who can have access to sensitive business data.• What can be accessed using personal devices?
What can’t? • Who can have access to the employee’s
personal device?
Financial ManagementWho is financially responsible for personal mobile devices
used in your business?
• Various models – depends on strategy– Company pays nothing– Company pays everything– Somewhere the middle?– Capital costs–Monthly costs– The device, apps, peripherals, network fees,
etc
Governance• Who owns and administers the policy?
• Will there be a reward / consequence?
• Will it be reviewed?
Successful Road Map to BYOD
Create a BYOD Policy – Decide on and institute a governance model
Upgrade IT – Security & Infrastructure
Onboard employee personal devices
IT SUPPORT & SOLUTIONS FOR WESTERN CANADIAN BUSINESSES
Thank You!Enjoy yourselves and please get home safely!