<img alt="" src="https://secure.ruth8badb.com/159331.png" style="display:none;">
Cimpl Blog

Cimpl Blog

Your Weekly Insights on How to Manage your Enterprise Digital Footprint.

There Are Some Pretty Serious Security and Cost Issues with BYOD

Posted by Henry Cheang | August 13, 2014 7:00 AM
Bring-Your-Own-Device (BYOD) is becoming more popular than ever. This in turn has created serious device management challenges for many organizations. In the spirit of community, Cimpl has created “A Practical Guide to BYOD”, a comprehensive but easy-to-read manual to help IT managers make the most informed and optimal BYOD policies for their companies!pg_preview_EN


In “A Practical Guide to BYOD”, we cover the following topics and answer important questions:

Security issues surrounding BYOD
  • The device doesn’t belong to the company – that means administrator privileges lie elsewhere. How does this impact the organization?
The hidden costs of BYOD
  • Superficially, BYOD seems like a great deal. The truth is that it’s really, really, really not. How much does BYOD cost an organization?
Practical advice on how to set BYOD policies
  • What are the must-haves for any BYOD policy? This one is so important that I’m going to give you a sneak peek right this moment:
    • You MUST manage your employees’ Bring-Your-Own-Applications (BYOA) which they’ve brought in with their devices
    • You MUST require standardized core features
    • You MUST mandate minimum levels of BYOD device functionality
    • You MUST create an environment of interoperability
    • You MUST understand the scope of BYOD implementation. What are the challenges involved in rollout, management, and compliance?
  • What are the concrete steps in setting BYOD policies once you’ve established your must-haves? It’s all well and good to know what’s needed at the theoretical level. Now, what are the practical actions to take?

Bring Your Own Device BYOD

Benefits and drawbacks of alternative models to BYOD

  • It’s not all BYOD, all the time. We cover many other alternatives. You’ll get answers to:
    • What is Choose Your Own Device (CYOD)?
    • What is Corporate-Liable, Employee-Owned (CLEO)?
    • What is Employee-owned, employee-liable (EOEL)?
    • What is Shared Responsibility?
    • What is Employee-owned, carrier-contract (EOCC)?
    • What is Corporate-owned, personally-enabled (COPE)?
  •  In addition to answering those questions, we created an easy-to-follow chart that allows you to casually compare the merits of each model against one another!

As we’ve written before, many, many, many people are still in the dark about BYOD. Critically, this knowledge gap includes a lack of awareness of how to protect an organization against security issues as well as how to craft and enforce a comprehensive but feasible BYOD policy.

The thing is, just right now the grand majority of IT professionals haven’t yet devised BYOD guidelines for their companies. Alternatively, even if they have, the information hasn’t been communicated. Either way, lack of guidelines or lack of communication (or both) really are the cause of BYOD-related issues in businesses. “A Practical Guide to BYOD” should help fix that!

No matter how you (in your role as an IT manager) ultimately proceed after you’ve read “A Practical Guide to BYOD”, you need to craft a concise and easy-to-follow BYOD policy that balances company needs and employee rights. Both need to be aligned in order for your organization to thrive, after all. BYOD is currently a big threat to the intellectual property of employer and employee alike, and our guide will help you navigate your way around this challenge!

And so, I highly recommend that you read “A Practical Guide to BYOD”, followed by contacting us at Cimpl! We’re Canada’s leader in IT and telecom expense management, and we’ve been giving companies great visibility on all their IT and telecom assets for over a decade now. If you need expert guidance on how to draft and enforce policy governance for BYOD, Cimpl is your prime destination!

RFP Template_CTA_gif


Topics: Bring Your Own Device (BYOD), Security, Best Practices

Written by Henry Cheang

Henry is a dedicated technical writer, focused on conducting market research, contributing to product design, and writing clear and concise documentation for the company. He is an enthusiastic team member and is passionate about science and technology, who plays a key role in Cimpl’s product messaging. His dedication to writing is reflected in his experience in authoring academic papers, documentation, user guides, and in contributing to Cimpl’s marketing efforts.

Subscribe to our Blog

Follow Us!

2019 Product Roadmap Webinar
What is WEM? ePaper
What is UCCEM?