Blog


← Back to BLOG

12
Oct
2020
10 Successful Steps to Implement a Bring Your Own Device (BYOD) Policy

10 Successful Steps to Implement a Bring Your Own Device (BYOD) Policy

Big CyberSecurity Risks

Though there are big benefits to having a BYOD program, including boosting employee productivity and morale, as well as possible cost savings, security risks are a critical concern.

Overworked professionals are trying to boost productivity any way they can, leading 67 % of employees to access company data on their mobile devices. And businesses equally hungry for efficiency are responding with bring-your-own-device (BYOD) programs.

Some FUN Statistics

The following statistics came from the article “41 Stunning BYOD Stats and Facts to know in 2020”. 

•67% of employees use personal devices at work

•BYOD generates $350 of value each year per employee

•A BYOD-carrying employee works an extra two hours

•87% of businesses are dependent on their employee’s ability to access mobile business apps from their smartphone

•69% of IT decision-makers in the U.S. say BYOD is a good thing

•BYOD market size is expected to reach $366.95 billion by 2022

•59% of organizations adopt BYOD

 

Step 1: Appoint a Core Team

Appoint a small, dedicated team to take charge of evaluating your current BYOD state, devising effective goals and developing a strategy to achieve them while enabling a competitive advantage for the organization. This team should include members from your Information Technology Department and the business units who can remain impartial, but have a vested interest in a viable strategy. Consider additional participation from your human resources and legal departments, and possibly outside consulting firms that have a broader perspective of the industry and can facilitate your objectives.

Step 2: Define and Align Your BYOD Goals

To create a viable strategy, BYOD objectives should be defined with a clear understanding of how they align with the organization’s overall strategic goals. A BYOD strategy can only be successful if its goals are tied to business objectives. Your BYOD goals should reflect a balance of enablement, empowerment, security and governance for your organization.

Step 3: Understand How BYOD is Used Today

Once your overall BYOD goals are determined, the team should gain perspective from members of the various business units, including sales, C-level executives, human resources, and other key departments to determine which personal devices, applications, and personal cloud services are in use today, how they are used, how tech-savvy the users are, and how employees feel these tools enhance their effectiveness and productivity. It’s important to take a positive tone during these discussions, so that users don’t feel threatened with the loss of their rights or tools.

Step 4: Understand Your Security and Compliance Posture

Establish an understanding of your organization’s risk threshold by conducting a vulnerability assessment, AKA a Risk Assessment, and evaluating security and compliance requirements. Assess the impact of your current BYOD situation on those requirements. You can consider how the organization deals with remote access from personal computers or laptops to baseline how devices such as smartphones and tablets are being controlled.

Step 5: Start Building a Strategy

Use the goals you’ve devised and the knowledge you’ve gathered to start building a BYOD strategy. Any IT strategy has to include policy, processes and resources. Policies set expectations by outlining rules and requirements and identifying how they will be enforced. Processes are activities and tasks that are applied to meet the expectations, and to facilitate the achievement of goals and objectives. Resources—including people, technology solutions and money—are applied to enable the effectiveness of the processes that in turn meet the expectations.

Step 6: Devise a Policy

A strong policy clearly indicates which departments and roles may be empowered with BYOD, in accordance with your goals. Which devices, applications, and level of network and data access are permitted for each? What constitutes acceptable and unacceptable mobile device use? It should define password requirements and determine the steps employees should take to back up and update their devices, and steps to follow in the event of a lost, stolen, or hacked device. It should indicate who can connect devices to the corporate network, how they can be connected and authenticated, what data can and cannot be accessed, which applications are permitted, and the types of data that can be stored on mobile devices. The exception process and penalties for noncompliance should also be addressed.

Step 7: Establish Processes

Mature processes will enable the organization to be productive. These processes can aid in connecting different departments of the organization. For example, IT should be notified when Human Resources hires a new employee so that the employee’s mobile device can be enabled. Processes should be developed to implement and enforce policies. Make sure you include processes for provisioning and deprovisioning them when employees leave the company.

Step 8: Acquire and Deploy Resources

The resource component of a BYOD strategy consists of IT tools and the people who deploy and use them. Certain enterprise BYOD tools can help protect your network and data from vulnerabilities presented by mobile devices. The technologies that are right for your organization depend on your goals and objectives. It is best to not focus on the features and functionality of a specific technology, but rather how its capabilities can help you gain a competitive advantage in the marketplace. Many companies find it beneficial to leverage a vendor independent technology partner to test various solutions and find the right fit for their organization.

Identifying the right people to facilitate your strategy is as important as selecting the technology. As the BYOD program is implemented, additional roles may need to be created. Some organizations advocate the creation of a chief mobility officer role to oversee their mobility efforts. At the very least, additional training will need to be developed to inform various parts of the organization about the impact of mobility.

Step 9: Educate

No matter how much you try to educate your users about policies and processes, you can only be successful if you achieve buy-in. Policies and processes cannot be effective unless employees understand the reasoning behind them. BYOD education should start immediately when users begin work for your organization and continue with periodic refreshers. BYOD courses can be held online or in person. One way to help users understand the importance of BYOD policy is to highlight the publicized intrusion and data theft incidents of other organizations resulting from mobile device use. Focus the education on protecting not only the company, but also the employees’ personal information and livelihood.

Step 10: Revisit your Strategy

The BYOD landscape—consisting of devices, software and cloud services—is a fast-moving target. Your core team should continually revisit your BYOD strategy. It is important to conduct regular vulnerability assessments and review your policies, processes, resource tools, and education to ensure that they are still effective. This should be done at least once a year; depending on the dynamics of the organization, once every three months may be a more appropriate time frame. Breaches or outages related to mobile technology may necessitate an ad hoc reexamination of your BYOD strategy.

navitend can help you.  Call 973.448.0070 or setup an appointment today.  Book Now

Make your life easier …….

Contact us at 973.448.0070

Testimonials

  • "Thanks so much again for taking care of everything in such an expedient manner. It's a pleasure to work with navitend and its staff as always!"

    Lawrence Wolfin / Textol Systems, Inc.
  • “Navitend’s expertise helped our firm over the past year to effectively elevate our I.T. game, powering our website into a highly interactive tool. Well done to Frank and his team!”  

    Chuck Steege, CFP®, CEP, President, SFG Wealth Planning Services, Inc.
  • "Thanks so much!  You are a class act!  
    You and your team have really done an excellent job on this!"

    Steve Van Ooteghem, The C12 Group in Houston, Texas
  • "We've dedicated our lives to growing our retail and ecommerce business and it's a relief to have found a company like navitend who treats our business likes it's their own. navitend's personal approach to project management and problem solving are top-notch."

    Stamatis, Co-owner Twisted Lily, Fragrance Boutique and Apothecary
  • "I appreciate that they didn’t just build the application. They made it better by bringing ideas to the table that not only made for a better user experience, but also kept the development costs down."

    Andy Lynch / North Star Marketing
  • "Our company is more efficient and has grown as a result of navitend’s work. navitend helped us get to the next level."

    Greg Niccolai / Madison Insurance
  • "navitend has been a great IT partner for our company.  Their helpdesk response time is the best I have experienced in my 30 year career.  navitend has helped me to have great IT services without the need to have a full time, in house, technician at significant savings to our company."

    Bob Bradley, President, Bradley Graphics
  • navitend’s approach to customer service is greatly appreciated here.  Ensuring that we are well protected from a technology standpoint provides us with peace of mind to continue our day to day operations and that they are looking out for our company's best interest. 

    Debbie
  • "I look forward to working with you again in the future. Once again, thanks to your organization for your prompt response."

    Luke Wolters / Luke Wolters Tax Consultants