BYOD, well you don’t have to be a
genius to know where that term derived from.
Anyone who went through college knows that BYOB was the ubiquitous term
for Bring Your Own Beer at a party.
Today, BYOD is more popular in the IT crowd, which does speak to the
fact that we all need to get out more often… Anyway, just because the origins
of the term came from Bohemian roots doesn’t mean that the destination has to
have the same atmosphere, i.e., People, it’s not a party! Many IT organizations have found this new
trend of introducing mystery devices on their enterprise nothing short of
ordered chaos. With that CIO magazine
published what it termed the 5 BYOD pitfalls you can run into. Share and Enjoy…
David Schofield, a partner at
mobile consultancy Network Sourcing Advisors, last year reported that when
about 600 workers jumped on a new BYOD smartphone program at a tech company,
expenses went through the roof: collectively $300,000 over budget in the first
year.
Pitfall 1: An 'Open Door' Attitude toward Apps
Most iPhone owners visit the App
Store regularly, downloading all sorts of apps-from Dropbox to Angry Birds-that
are dangerous to the enterprise. These apps can lead to corporate data leakage,
open the doors to malware or bring the potential to make workers unproductive.
BYOD's early adopters often
acquiesced to employee demands ("Are you saying I can't have Angry Birds
on my iPad?!") when it came to apps, even allowing employees to expense
publicly available apps such as iWorks and GoodReader.
But smart CIOs are taking control
of this exploding app problem before it gets out of hand. They're building
private enterprise app stores, developing custom apps, creating app whitelists
and blacklists, pushing out mandatory apps, and putting in place copy-and-paste
restrictions.
It's important to note that
they're not taking a hardline approach. Part of the job of the CIO is to find
middle ground. Geofencing, for instance, creates a virtual perimeter that lets
employees have Angry Birds and play Angry Birds, but just not play Angry Birds
at work. Geofencing also prevents employees from downloading hi-def videos on
their BYOD tablets and clogging up the network.
Pitfall 2: Playing the Role of Big Brother
Geofencing's dark side, however,
is that it requires BYOD phones and tablets to turn on location services. But
employees don't like companies to use their personal devices as corporate spies
and monitor their whereabouts. It's a little too Orwellian.
But CIOs need to continuously
monitor BYOD phones and tablets to protect sensitive information. This means
they need to strike a balance between a company's right to monitor, access, and
review and disclose company data on a mobile device and the employee's expectations
of privacy.
In the case of geofencing, a CIO
can set parameters for location tracking to be done only during work hours.
Employees will have to trust that the company isn't secretly monitoring their movement’s
off-hours or reading personal email and text messages.
Pitfall 3: Ignoring Usage Tracking
Trust is a two-way street, and
some early BYOD adopters went overboard in trusting employees. That is, they
didn't track talk, text, data and roaming usage, says Gupta. What happened?
CIOs told horror stories about thousands of dollars in international roaming
charges, employees expensing family plans, and other nefarious and costly
deeds.
David Schofield, a partner at
mobile consultancy Network Sourcing Advisors, last year reported that when
about 600 workers jumped on a new BYOD smartphone program at a tech company,
expenses went through the roof: collectively $300,000 over budget in the first
year. "It was just outrageous," Schofield says.
In some cases, lack of BYOD
monitoring has led to the dreaded "zombie" phone, Gupta says.
What's a zombie phone? Early
adopters of BYOD found hidden costs in the form of BYOD-only expense-report
processing fees, and so they decided to reduce the number of expense reports
with an automatic flat stipend appearing in an employee's paycheck. If a CIO
didn't monitor usage, devious employees took advantage with a zombie phone-a
phone that has zero usage yet still receives the automatic stipend.
Pitfall 4: Allowing Rogue BYOD Phones and Tablets
On the one hand, BYOD lets people
choose their personal devices for work purposes, essentially making employees
more familiar and productive with the technology. These mobile devices are
within hand's reach during off-hours and weekends. It's this power of choice
that leads to BYOD's greatest benefits.
On the other hand, CIOs need to
put restrictions and limitations on personal choice. After all, they can't let
any device onto the corporate network. "Surely, you cannot allow
jail-broken iPhones and rooted Android devices to access enterprise data
resources and expose the organization to malware and virus attacks," Gupta
says.
The best response is to support
the popular consumer devices coming from Apple and Samsung and then muddle
through the rest. There's really no optimal solution, but leaning too far to
either side can be disastrous.
Pitfall 5: Giving BYOD Policies Short Shrift
Perhaps the biggest pitfall, one
that encompasses the previous four, is poor communication about BYOD between IT
and employees. Poor communication, by the way, has been a major thorn in the
IT-business relationship for decades.
With BYOD, communication needs to
get good quickly.
Employees need to know what will
and will not be monitored; what apps are dangerous to the company; what kinds
of devices and operating systems are allowed; what the expectations are for
privacy; what will happen in cases of lost devices, lawsuits and employee
termination; and what the consequences are for noncompliance.
Unfortunately, too many early
adopters crafted a BYOD user policy without a lot of detail.
"The biggest red flag is the
one-page, isn't-this-policy-great kind of policy that says, 'Here are some
things to be aware of,' but it doesn't get into the obligations and rights for
both the company and program participant," says Matt Karlyn, partner in
the technology transactions practice group at Boston law firm Cooley LLP.
On the upside, thanks to the
lessons learned from BYOD's early adopters, you can map out your BYOD plan and
avoid these pitfalls. Even if you've fallen into any of these traps, there's
still time to regain your footing.
"BYOD looks like its
widespread, but it's not," Gupta says. "There's a learning curve, and
mobility is changing rapidly... The vendors themselves are learning as
well."
In other words, the BYOD journey
is just beginning.
Source(s):
http://www.cio.com/article/735159/5_BYOD_Pitfalls_and_How_You_Can_Avoid_Them
So “Once more unto the breach, dear friends, once more;”
Source(s):
http://www.cio.com/article/735159/5_BYOD_Pitfalls_and_How_You_Can_Avoid_Them
So “Once more unto the breach, dear friends, once more;”
____________________________________________________________
About Rick Ricker
An IT professional with over 21 years experience in Information Security, wireless broadband, network and Infrastructure design, development, and support.
For more information, contact Rick at (800) 399-6085 x502


No comments:
Post a Comment
Thanks for your input, your ideas, critiques, suggestions are always welcome...
- Wasabi Roll Staff