cimplBlog_banner.png

Cimpl Blog

Your Weekly Insights on How to Manage your Enterprise Digital Footprint.

BYOD and IT Security

Posted by Caroline Le Brun | May 22, 2012 10:52 AM

BYOD and IT Security

Many corporations that allow employees to use their own mobile devices at work implement a BYOD security policy that clearly outlines the company's position and governance policy to help IT better manage these devices and ensure network security is not compromised by employees using their own devices at work.

50% of IT Managers have seen an increase in employee productivity due to BYOD and companies who allow their employees to connect have, on average, a higher employee satisfaction rate.

According to the Ericsson 2012 top 10 telecom trends, everything connects. To this end mobile data surpassed voice in the fourth quarter of 2009 and doubled voice in the first quarter of 2011. Consumers are increasingly connecting to the internet and to things around them, such as cars, vending machines, ticket gates and more. As a result today, employees expect to use personal smartphones and mobile devices at work, making bring your own device (BYOD) security a concern for most large enterprise and medium sized organizations IT teams.

BYOD security can be addressed by having IT provide detailed security requirements for each type of personal device that is used in the workplace and connected to the corporate network. For example, IT may require devices to be configured with passwords, prohibit specific types of applications from being installed on the device or require all data on the device to be encrypted.

Other BYOD security policy initiatives may include limiting activities that employees are allowed to perform on these devices at work (e.g. email usage is limited to corporate email accounts only) and periodic IT audits to ensure the device is in compliance with the company's BYOD security policy.

Lastly it is not such a gamble to allow employees to connect to the company’s business networks, as far as productivity goes for organizations that utilize a telecom expense management solution. End-user abuse can easily be weeded out through steps that match up non-work usage of devices, comparing bills to contracts, and matching plans to actual needs. These steps save the company valuable time, money, and resources, while still granting the hard working employees the network connection that they deserve.

 

 Checklist

 

Topics: BYOD, Security

Written by Caroline Le Brun

As a 16-year marketing veteran, Caroline’s experience extends across multiple industries. Since she joined Cimpl, her successful marketing campaigns have increased the company’s online and community presence, in addition to Cimpl’s footprint and appearances in new or traditional media (such as the Globe and Mail). Caroline is a specialist in communication and social media. She works closely with analysts to keep track of and adapt to the trends and changes in the industry of IT: Technology Expense management, IT cost optimization, Technology trends. Her leadership conducts Cimpl’s marketing team toward ever greater achievements. Caroline is also an exemplary citizen. Outside of work, she is involved in TEMIA, the Dorval Day Camp, and other community organizations. She has a Bachelor’s degree in Commerce from Concordia University and a Master Certificate in Integrated online Strategies from the University of San Francisco Intensive Development program.

Follow Us!

Self-Assessement_Checklist
Customer Stories: Access now!

Subscribe to our Blog