BYOD best practices

Bring Your Own Device (BYOD) initiatives are extremely popular, with over 85% of organisations having embraced BYOD in some capacity[1]. This is because BYOD brings benefits to both employees and businesses. For example:

  • Employees don’t want to struggle with outdated and unfamiliar tech. Instead, they want to use the same high-quality tools and practices they do in their personal time. BYOD makes this possible
  • To facilitate mobile working practices, organisations need the right technology. But buying and maintaining business devices can be expensive. With BYOD much of that cost can be passed to your employees.

So, the benefits are clear. But how can you exploit the potential of BYOD and ensure that it works for your organisation?

Create a strategy

Before you allow your employees to use their personal devices for work, you must first develop a BYOD management plan. This plan should address issues such as data and organisational security, and look at how you will maximise productivity and maintain operational best-practice.

Ensure device and software compatibility

When you run a business, there are some applications that every employee needs. But using these on personally owned devices can slow them down, or cause computers (or the apps) to stop working altogether. To ensure this doesn’t happen, you need to be able to deal with IT issues across a plethora of devices and operating systems. Without this, your BYOD capabilities will be severely limited.

In truth, not all personal devices are suitable for work purposes.  For example, an out-of-date laptop might be inefficient or un-secure. As such, you need to ensure the right balance between employee convenience and operational productivity.

One way of making this process simpler is to adopt an alternative ownership model which gives your employees a choice of pre-approved devices that can be controlled by your company. Using cloud-based service management software can also help.

Put robust security measures in place

If you want to protect your network and maintain the integrity of employee devices, security must be made a top priority when allowing BYOD. Data leaks, lost devices, unauthorised access, the risk of downloading and spreading malware and viruses, and a lack of monitoring all need to be taken into consideration.

Before you implement a BYOD scheme, make sure you establish tools and practices to protect personal devices. Things like Two Factor Authentication (2FA), adequate password controls, and the ability to remove sensitive data from devices remotely can help to reduce the risk and allow mobile workers to use their devices securely.

You should also look at the issue of access control so to ensure compliance and limit what data employees can access with their personal devices.

Address any legal issues

Data protection is more critical than ever. But the blurring of personal and private information on employee-owned devices can make this difficult. To ensure compliance, you must establish what devices and applications are allowed to access your network. You should also set out where, when and how data can be accessed.

When looking at the legality of BYOD you should also create clear standards for maintaining user privacy. While you might need to monitor device usage you must not access or view private data.

For more information on how our service management software can help you to work smarter, contact us today for an informal chat.


[1] Bitglass 2018 BYOD Security Report