{"id":1547,"date":"2012-09-27T18:28:49","date_gmt":"2012-09-27T18:28:49","guid":{"rendered":"http:\/\/clikcloud.net\/bns\/beyond-bring-your-own-device\/"},"modified":"2012-09-27T18:28:49","modified_gmt":"2012-09-27T18:28:49","slug":"beyond-bring-your-own-device","status":"publish","type":"post","link":"https:\/\/clikcloud.net\/3gtelco\/beyond-bring-your-own-device\/","title":{"rendered":"Beyond Bring Your Own Device"},"content":{"rendered":"<h1>Beyond Bring Your Own Device (BYOD)<\/h1>\n<p>Many businesses have adopted an IT policy of <strong>Bring Your Own Device (BYOD)<\/strong> to save money and provide employees with the flexibility of staying connected when they travel, work from home and spend time in the field.\u00a0 The <strong>BYOD<\/strong> policy allows employees to use personal <strong>smart phones and tablets<\/strong> for business purposes.<\/p>\n<p>According to research firm Computer Economics, companies can save between $1350 and $3500 annually by adopting a <strong>BYOD policy<\/strong>.\u00a0 In addition, employees can be more\u00a0productive\u00a0and have higher job satisfaction with a <strong>IT<\/strong>\u00a0<strong>mobility plan<\/strong>.<\/p>\n<p>According to research by the Computer Technology Industry Association, CompTIA, security is the primary issue for IT Managers when it comes to mobility.\u00a0 The number one risk cited is <strong>loss or theft of a mobile device<\/strong>.\u00a0 Seventy percent of those surveyed implement mobile device password locking as part of their <strong>data protection plan for mobile devices<\/strong>.<\/p>\n<p>However, a<strong> four digit password<\/strong> in itself is not enough security,\u00a0so there are a number of additional precautions companies should take to <strong>protect valuable corporate data<\/strong>.<\/p>\n<p>Here are a few recommendations you may consider to help mitigate risk from your BYOD policy:<\/p>\n<p>Have employees agree to a policy of notifying the company in a timely manner when a device is lost or stolen.\u00a0 If the company uses technology to \u201cwipe\u201d corporate data from the mobile device ensure employees keep personal data separate or prevent company data from residing on the mobile device all together.<\/p>\n<p>Local laws may prevent an employer from wiping or \u201crooting\u201d a mobile device upon loss, theft or employee termination.\u00a0 If you do business in foreign countries be aware of the governing laws if you implement a BYOD policy.<\/p>\n<p>If an employee is attaching to your corporate or <strong>WiFi network<\/strong>, consider auditing your network for unauthorized mobile devices.\u00a0 Also, consider implementing corporate guidelines for supported mobile devices.\u00a0 Have a policy that ensures all mobile devices are up to date with Operating System O\/S Patches and also have up to date anti-virus and anti-malware installed.<\/p>\n<p>If employees are accessing corporate systems using mobile applications, publish a list of \u201cwhite listed\u201d or approved applications. \u00a0Additionally, publish a list of \u201cblack listed\u201d or unauthorized mobile applications.\u00a0 \u00a0In the alternative, consider maintaining a private or enterprise application store to manage the distribution and updates for approved mobile applications.<\/p>\n<p>If employees use cloud based data sharing, create company policy and guidelines for what, if any, corporate data may reside on mobile devices.\u00a0 If corporate data is authorized for a mobile device consider encrypting the data on the device, as well as, the data transmitting Over The Air (OTA).<\/p>\n<p>Security is the top priority when it comes to implementing a company Bring Your Own Device (BYOD) policy.\u00a0 There are a variety of technical solutions, in addition to policy based issues required to safely and securely implement a BYOD policy.\u00a0 Consult with your IT Service Provider to ensure your mobile device policy is a secure one.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Beyond Bring Your Own Device (BYOD) Many businesses have adopted an IT policy of Bring Your Own Device (BYOD) to save money and provide employees with the flexibility of staying connected when they travel, work from home and spend time in the field.\u00a0 The BYOD policy allows employees to use personal smart phones and tablets [&hellip;]<\/p>\n","protected":false},"author":2,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_et_pb_use_builder":"","_et_pb_old_content":"","_et_gb_content_width":"","footnotes":""},"categories":[6],"tags":[8,9,11,14,25,36,37,47,53,56],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v21.2 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Beyond Bring Your Own Device<\/title>\n<meta name=\"description\" content=\"Beyond Bring Your Own Device (BYOD) Many businesses have adopted an IT policy of Bring Your Own Device (BYOD) to save money and provide employees with the\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/clikcloud.net\/3gtelco\/beyond-bring-your-own-device\/\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"zorro\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"2 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/clikcloud.net\/3gtelco\/beyond-bring-your-own-device\/\",\"url\":\"https:\/\/clikcloud.net\/3gtelco\/beyond-bring-your-own-device\/\",\"name\":\"Beyond Bring Your Own Device\",\"isPartOf\":{\"@id\":\"https:\/\/clikcloud.net\/3gtelco\/#website\"},\"datePublished\":\"2012-09-27T18:28:49+00:00\",\"dateModified\":\"2012-09-27T18:28:49+00:00\",\"author\":{\"@id\":\"https:\/\/clikcloud.net\/3gtelco\/#\/schema\/person\/c47ddfc516e95fc306f15e9150068942\"},\"description\":\"Beyond Bring Your Own Device (BYOD) Many businesses have adopted an IT policy of Bring Your Own Device (BYOD) to save money and provide employees with the\",\"breadcrumb\":{\"@id\":\"https:\/\/clikcloud.net\/3gtelco\/beyond-bring-your-own-device\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/clikcloud.net\/3gtelco\/beyond-bring-your-own-device\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/clikcloud.net\/3gtelco\/beyond-bring-your-own-device\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/clikcloud.net\/3gtelco\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Beyond Bring Your Own Device\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/clikcloud.net\/3gtelco\/#website\",\"url\":\"https:\/\/clikcloud.net\/3gtelco\/\",\"name\":\"3G Master (3gtelco)\",\"description\":\"\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/clikcloud.net\/3gtelco\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-US\"},{\"@type\":\"Person\",\"@id\":\"https:\/\/clikcloud.net\/3gtelco\/#\/schema\/person\/c47ddfc516e95fc306f15e9150068942\",\"name\":\"zorro\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/clikcloud.net\/3gtelco\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/756224ccb98592870f4ba986d20b20da?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/756224ccb98592870f4ba986d20b20da?s=96&d=mm&r=g\",\"caption\":\"zorro\"},\"sameAs\":[\"http:\/\/www.clikcloud.com\"],\"url\":\"https:\/\/clikcloud.net\/3gtelco\/author\/zorro\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Beyond Bring Your Own Device","description":"Beyond Bring Your Own Device (BYOD) Many businesses have adopted an IT policy of Bring Your Own Device (BYOD) to save money and provide employees with the","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/clikcloud.net\/3gtelco\/beyond-bring-your-own-device\/","twitter_misc":{"Written by":"zorro","Est. reading time":"2 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/clikcloud.net\/3gtelco\/beyond-bring-your-own-device\/","url":"https:\/\/clikcloud.net\/3gtelco\/beyond-bring-your-own-device\/","name":"Beyond Bring Your Own Device","isPartOf":{"@id":"https:\/\/clikcloud.net\/3gtelco\/#website"},"datePublished":"2012-09-27T18:28:49+00:00","dateModified":"2012-09-27T18:28:49+00:00","author":{"@id":"https:\/\/clikcloud.net\/3gtelco\/#\/schema\/person\/c47ddfc516e95fc306f15e9150068942"},"description":"Beyond Bring Your Own Device (BYOD) Many businesses have adopted an IT policy of Bring Your Own Device (BYOD) to save money and provide employees with the","breadcrumb":{"@id":"https:\/\/clikcloud.net\/3gtelco\/beyond-bring-your-own-device\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/clikcloud.net\/3gtelco\/beyond-bring-your-own-device\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/clikcloud.net\/3gtelco\/beyond-bring-your-own-device\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/clikcloud.net\/3gtelco\/"},{"@type":"ListItem","position":2,"name":"Beyond Bring Your Own Device"}]},{"@type":"WebSite","@id":"https:\/\/clikcloud.net\/3gtelco\/#website","url":"https:\/\/clikcloud.net\/3gtelco\/","name":"3G Master (3gtelco)","description":"","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/clikcloud.net\/3gtelco\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-US"},{"@type":"Person","@id":"https:\/\/clikcloud.net\/3gtelco\/#\/schema\/person\/c47ddfc516e95fc306f15e9150068942","name":"zorro","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/clikcloud.net\/3gtelco\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/756224ccb98592870f4ba986d20b20da?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/756224ccb98592870f4ba986d20b20da?s=96&d=mm&r=g","caption":"zorro"},"sameAs":["http:\/\/www.clikcloud.com"],"url":"https:\/\/clikcloud.net\/3gtelco\/author\/zorro\/"}]}},"_links":{"self":[{"href":"https:\/\/clikcloud.net\/3gtelco\/wp-json\/wp\/v2\/posts\/1547"}],"collection":[{"href":"https:\/\/clikcloud.net\/3gtelco\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/clikcloud.net\/3gtelco\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/clikcloud.net\/3gtelco\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/clikcloud.net\/3gtelco\/wp-json\/wp\/v2\/comments?post=1547"}],"version-history":[{"count":0,"href":"https:\/\/clikcloud.net\/3gtelco\/wp-json\/wp\/v2\/posts\/1547\/revisions"}],"wp:attachment":[{"href":"https:\/\/clikcloud.net\/3gtelco\/wp-json\/wp\/v2\/media?parent=1547"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/clikcloud.net\/3gtelco\/wp-json\/wp\/v2\/categories?post=1547"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/clikcloud.net\/3gtelco\/wp-json\/wp\/v2\/tags?post=1547"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}