SORT BY Relevancy
The rapid proliferation of mobile devices entering the workplace feels like divine intervention to many IT leaders. It’s as if a voice boomed down from the mountain ordering all of the employees you support to procure as many devices as possible and connect them to corporate services en masse. Bring Your Own Device (BYOD) was born and employees followed with fervor.
There’s no sense pretending it isn’t happening or saying, “We don’t let our employees do that.” The truth is, they’re doing it already and will continue to burrow noncompliant devices into your network with or without your permission. Forrester’s study of US information workers revealed that 37% are doing something with technology before formal permissions or policies are instituted. Further, a Gartner CIO survey determined that 80% of employees will be eligible to use their own equipment with employee data on board by 2016.
This raises the inevitable question: how will you support workforce desire to use personal apps and devices while allowing them to be productive in a secure environment that protects corporate data? I hope these "Ten Commandments of BYOD" show you how to create a peaceful, secure, and productive mobile environment.
The U.S. trucking industry is currently debating the pros and cons of mobile communication platforms as it relates to Company-Owned Personally Enabled devices (COPE) or to rely on the Bring Your Own Device platform, simply known as BYOD.
Christian Schenk is Senior Vice President of product strategy and market growth for XRS Corporation, specializing in helping private and for-hire fleets use driver and vehicle data to improve every aspect of their operations.
Mr. Schenk points out that mobile technology (BYOD) over traditional, bulky "onboard computers," is already here as nearly 90% of truck drivers currently have personal mobile devices in use.
XRS is able to support more than 100 mobile devices within its portfolio, on four networks across the United States and Canada.
Mr. Schenk joins us as our special guest to further discuss the XRS Mobile Communication platform, the facts behind the BYOD technology and why their platform is considered to be revolutionizing the industry.
Supt. Mark Benigni called me and told me about this...how working in a BYOD environemnt , building new schools and having student sget involved in teacher's PD is changing the face of education in Meriden. Its a win win for everybody and students Michaela Blain, Aidan Messier and Jackie Townnsend will be our guests along with Social Studies teacher James Flynn
A Smarter Approach to Mobile Device Management
More people today use personal mobile devices like smartphones and tablets for business purposes. Such devices, coupled with greater Wi-Fi accessibility and cloud services, have empowered us with the ability to access data and do business from practically anywhere at anytime.
Needless to say, many small-to-medium sized business owners have embraced the BYOD (Bring-Your-Own-Device) revolution. The benefits are obvious; increased employee productivity, enhanced services to customers/clients, and better overall customer and employee satisfaction.
But what about the potential consequences associated with this mobility revolution? Are small business owners doing enough preemptive planning to address potential risks that could arise with the use of BYOD devices?
4 Essential Pieces to Any Small Business BYOD Strategy
Believe it or not, once upon a time, kids at the bus stop didn’t have cell phones and the mobile device strategy of many businesses was typically you’ll take what you’re given, refrain from using it for any personal use, and the data may be scrubbed clean whenever we please.
We’ve come a long way. Today, businesses really have no choice but to let employees use personal devices for work purposes. Blurred lines now make it difficult to differentiate between what is professional and what is personal. A company or organization may partially pay for an employee’s tablet computer or smartphone, but that same device is used to upload photos to Facebook or download torrents of this season of Game of Thrones.
Naturally, security and privacy issues are a concern since these devices synch to the company network. Larger corporations may be able to hire IT support or produce sophisticated BYOD guidelines for employees to adhere to but smaller businesses have limited resources.
Part 1: The Good, The Bad, and the Ugly of Mobility and BYOD
There are a lot of advantages to mobility in today’s workforce, but the Bring-Your-Own-Device (BYOD) movement has also brought its share of headaches as well.
We live in a society where everyone must have the newest technology. We are inundated with ads reminding us that the smartphone or tablet we just bought a year ago is laughably outdated and inferior to the upgrade that just hit the market.
People who have just bought the latest technology don’t want to have to set it aside to use a separate company-issued device. As a result, businesses are beginning to grant these employee-owned devices access to their file and email servers, databases, and applications.
While this brings certain competitive advantages to employers, it naturally carries many risks, too.
Remember… Always Practice Safe BYOD
No matter what blog or magazine read these days, it seems like everyone is talking about today’s increasingly mobile workforce and the BYOD (Bring-Your-Own-Device) movement.
We live in an exciting time when work can be done at any time from any place. Employees love the fact that they can get work done on their iPad as they sit poolside sipping a Pina Colada. Businesses love the cost savings along with the happier and more productive employees they’re noticing. Meanwhile, customers and clients take note that their emails are commonly answered outside traditional work hours with a “Sent from my iPhone” tagline at the bottom.
Like anything related to business technology, there are naysayers who are quick to warn that a more mobile and dispersed workforce also means increased security risks.
Do they have a point? I'll cover that today!
Why SMBs Must Proactively Address the Threat of Mobile Hacks
More cyber criminals are targeting small-to-medium sized businesses. One reason for this is too many workplaces have insufficient bring-your-own-device (BYOD) policies in place. Some have none at all. Although firms are generally more knowledgeable about network security risks than in years past, they still woefully underestimate the security vulnerabilities linked to mobile devices like smartphones and tablets.
This is a real cause for concern since data breaches have the ability to put many already financially challenged SMBs out of business.
If customer/client data has been breached, there could be potential litigation costs, and naturally, lost goodwill and an irreparable hit to brand or company reputation. In part 2, we will discuss why this is a must!
3 Things to Consider Before Jumping Into BYOD
You’ve read it time and time again. “Bring Your Own Device” isn’t a trend, it’s the future. Workplaces where companies let workers use their own devices for work purposes are the new normal. BYOD attracts new hires and lifts employee morale and productivity. But this doesn’t mean a small business owner should recklessly jump right into BYOD just because everyone else is doing it. Data and network security concerns have to be thought out, defined, and addressed in a comprehensive BYOD policy. Here are three things to consider.
The number of mobile devices in healthcare facilities is increasing rapidly, as is the diversity of mobile platforms, operating systems (OSes) and communication methods that need to be supported by these organizations. In fact, in remarks made at George Washington University Hospital in Washington D.C., FCC Chairman Julius Genachowski said that healthcare is being “transformed” by broadband, and called out wireless and mobile in particular.
For its part in this transformation, Genachowski said,
The FCC is pursuing a health strategy with three key components: promoting connectivity; fostering fast-paced innovation of wireless networks, medical devices and mobile apps; encouraging greater adoption of life-saving health technology; and ensuring that spectrum is optimally allocated and managed.”
So on the outside, infrastructure and promotion is progressing, but what does mobility in healthcare look like from the inside?
A recent poll of managed Healthcare providers by the Aberdeen Group found three clear expectations for mobile healthcare technology: stem the rising costs of healthcare processes, improve staff productivity, and decrease the entry erroneous data.
To understand where mobility is headed though, it would first help to remember the mistakes of the past.
The BYOD wars are over, and the users have won. Instead of fighting BYOD, IT has to shift its focus to take advantage of mobility. While security and compliance are still important, IT must also plan for mobile applications that enhance productivity, trigger business transformation, or provide a competitive advantage. Whether you build or buy these apps, you need strategies to meet the expectations of mobile users who demand easy access to data and tools—and an engaging experience.
Join mobility consultant Michael Finneran and Interop Radio host Curt Franklin for an insightful conversation on how IT can strike a balance between protecting corporate data and systems while also fostering an environment where employees can make effective use of mobile technologies.
Register now and get ready to ask questions, chat with other IT pros, and hear practical guidance on BYOD and mobility.
Quel que soit la taille de votre entreprise, petite, moyenne ou grande, la vague du BYOD impacte de fait votre service informatique, en exigeant de vous, de nouvelles approches certes, mais aussi et surtout, de nouvelles solutions en termes de gestion des données, de sécurité, de virtualisation et de Cloud. Le BYOD entraine aussi de nouvelles demandes en termes de support et de gestion dans un environnement IT déjà souvent « bien chargé ». Lors de cette web-conférence animée par un journaliste et un expert du BYOD vous découvrirez :
- Comment gagner en efficacité tout en permettant une ouverture graduelle au BYOD ?
- Comment choisir des solutions de gestion et de virtualisation qui permettent de délivrer en toute sécurité les données et les applications métiers nécessaires au business de l’entreprise, partout et à tout moment ?
- Comment réduire la prégnance et la pression du BYOD sur vos ressources IT par le biais d’outils de gestion et de support automatisés ?
Join Host Live Chats
- High Frequency Radio Network (61 chatters)
- The Yaron Brook Show (8 chatters)
- WGAG Radio (7 chatters)
- SPIRITUALteacherbrendabradshaw (5 chatters)
- Life Conversations (4 chatters)
- GGM Radio (4 chatters)
- BITEradio me (2 chatters)
- Boomer and The Babe Network (2 chatters)
- Charlotte View Internet Radio (1 chatters)
- THE KOBG KNOCK OUT (1 chatters)