Many corporations that allow employees to use their own mobile devices at work implement a BYOD security policy that clearly outlines the company's position and governance policy to help IT better manage these devices and ensure network security is not compromised by employees using their own devices at work.
50% of IT Managers have seen an increase in employee productivity due to BYOD and companies who allow their employees to connect have, on average, a higher employee satisfaction rate.
According to the Ericsson 2012 top 10 telecom trends, everything connects. To this end mobile data surpassed voice in the fourth quarter of 2009 and doubled voice in the first quarter of 2011. Consumers are increasingly connecting to the internet and to things around them, such as cars, vending machines, ticket gates and more. As a result today, employees expect to use personal smartphones and mobile devices at work, making bring your own device (BYOD) security a concern for most large enterprise and medium sized organizations IT teams.
BYOD security can be addressed by having IT provide detailed security requirements for each type of personal device that is used in the workplace and connected to the corporate network. For example, IT may require devices to be configured with passwords, prohibit specific types of applications from being installed on the device or require all data on the device to be encrypted.
Other BYOD security policy initiatives may include limiting activities that employees are allowed to perform on these devices at work (e.g. email usage is limited to corporate email accounts only) and periodic IT audits to ensure the device is in compliance with the company's BYOD security policy.
Lastly it is not such a gamble to allow employees to connect to the company’s business networks, as far as productivity goes for organizations that utilize a telecom expense management solution. End-user abuse can easily be weeded out through steps that match up non-work usage of devices, comparing bills to contracts, and matching plans to actual needs. These steps save the company valuable time, money, and resources, while still granting the hard working employees the network connection that they deserve.