Just before the Christmas holiday, CSO offered five strategies to help mitigate post-holiday BYOD problems. Now that employees are returning to work, shiny new devices in hand, here's some additional insight.
For this recap, CSO once again spoke with Jonathan Dale, the Director of Marketing at Fiberlink, a mobile management and security firm recently acquired by IBM. The questions this time around centered on the aftermath of the post-holiday mobile boom, and what IT can do to keep things both secure and easily managed.
Education (it never ends):
As mentioned previously, education is important. Make sure that employees have some kind of a reminder when it comes to corporate policies governing personally owned mobile devices. If there's some type of mobile management solution in place, make sure employees know how to enroll.
Another tip that's good the second time around focuses on proactive education. Remind employees of the steps needed to enable Wi-Fi on their new devices in the office, including the steps needed for iOS and Android. Don t forget to touch basics such as SSID and automatic connections.
Another topic that was covered previously, which still applies, is privacy. Make sure employees know what parts of the device the company has access to, and what can be done with that access.
"Privacy is a major part of a successful BYOD program. There are several options so, know what abilities you as IT have and figure out what works best for your company culture or CEO," Dale said at the time.
Another side to that topic comes from a CSO reader, who commented that their organization has little BYOD enrollment. This is due to the clearly stated fact that on the corporate network, there is no expectation of privacy. In fact, outside of a small user base, their BYOD program is dead.
"Our BYOD policy clearly states there is no expectation of privacy when connected to the corporate network and using corporate systems. Pretty much stops most BYOD adoption dead in it's tracks. The rest that enroll get frustrated with the limited access our BYOD program provides so they opt out after a couple months," the comment explains.
Assuming that an MDM solution has already been deployed within the organization, there are a few key considerations that need to be taken into account, including working with, and not against the user.