(703) 288-9767    NTC Store
NTConnections Blog

NTConnections has been serving the Reston area since 2003, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Are You Prepared for Employees to Bring Their Own Devices?

Are You Prepared for Employees to Bring Their Own Devices?

Bring Your Own Device policies have helped many companies save money on technology by allowing employees to use their own devices, rather than taking on the cost of providing devices. However, as much as a BYOD approach can help a business financially, there are some potential drawbacks to adopting one that you should be prepared to deal with.

Managing These Mobile Devices
Whenever there is a Bring Your Own Device strategy enacted, there needs to be Mobile Device Management in action as well. Your MDM software also needs to be monitored, as this will inform you if someone without the proper authorization is accessing data that they shouldn’t be.

However, sufficient monitoring is a time-intensive task. It is even possible that it would require you to add an additional employee to properly make use of your MDM software. Before you commit to these measures, which are a must for successfully implementing BYOD, make sure you have (or can obtain) the resources to run them.

One great solution to mitigate your organization’s overall BYOD costs is the built-in automation that many of today’s Mobile Device Management platforms offer. This automation can be customized and run to allow your technicians to focus on the core aspects of your business’ technology rather than spend all of their time, and your money, monitoring employee smartphones.

Streamlining For Support
A major advantage to providing employees with work devices is the control you have over the devices you provide. By selecting a specific model for your employees to use, you can standardize your systems that much more, and make your IT administrator’s job that much easier. By reducing the variety of devices they need to be familiar with, IT can service them more quickly and effectively.

This can be a drawback to BYOD, as it makes support a more arduous task and--as a result--more costly. With a variety of devices and their specific issues, it becomes a more time-intensive task to identify and resolve any problems. Taking this into account, it may be a more cost-effective option to invest in standardized mobile devices for your company to use, rather than try to manage the variety of devices your workforce likely uses based on personal preference. This is a variable that you will need to consider based on your specific circumstances and abilities. Do you finance devices for your staff? Or, manage the varying devices your staff will bring?

Leaving Yourself Vulnerable
Not all devices are equally suited for use in a BYOD strategy--sometimes, a new feature can lead to a pretty severe vulnerability. Take, for example, any device with iOS 11 installed. Despite having switches in its control center to activate and deactivate Wi-Fi and Bluetooth, these switches don’t actually deactivate their connection. This leaves these devices vulnerable, and if they were a part of a BYOD implementation, your business becomes vulnerable, as well.

Wasted Resources
Often, the question isn’t if BYOD makes sense, it’s if BYOD makes sense for a particular employee to have access to. Some companies will reimburse their staff for the personal data that they use. However, if an employee’s responsibilities don’t really require the use of a mobile device, having them involved in a BYOD strategy is akin to paying for their personal use of the device; and, can hinder their overall productivity.

Don’t get us wrong--BYOD can be a great benefit to your business and its bottom line. You just shouldn’t dive in without considering the potential downsides and planning how you will go about solving these problems. The IT professionals at NTConnections can help. To learn more, call us today at (703) 288-9767.



No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Friday, June 22 2018

Captcha Image

Mobile? Grab this Article!

QR-Code dieser Seite

Tag Cloud

Security Tip of the Week Technology Best Practices Cloud Privacy Hackers Business Computing Microsoft Hosted Solutions Productivity Backup Internet Malware Google Mobile Devices Efficiency VoIP Business IT Support Network Security Email IT Services Managed Service Provider Miscellaneous Workplace Tips Innovation Server Data Disaster Recovery Business Continuity Network Upgrade Business Management Software Windows Saving Money Hardware Communication Computer Managed IT Services Android Mobile Device Management Virtualization Browser Smartphone Save Money User Tips Data Backup communications Smartphones Microsoft Office Outsourced IT Holiday Cybercrime Data Recovery BYOD Windows 10 WiFi Computers Internet of Things Hacking Chrome Big Data Small Business Social Media Remote Monitoring Operating System Mobile Computing Ransomware Cloud Computing IT Solutions Managed IT Services Application Alert Apple Automation Proactive IT Avoiding Downtime Collaboration VPN The Internet of Things Tech Term Social Engineering Quick Tips BDR Employer-Employee Relationship Information Technology Office Passwords Budget Marketing Recovery Telephone Systems spam Gadgets Cybersecurity Bandwidth Artificial Intelligence Going Green Remote Computing Mobility Managed IT Health Bring Your Own Device IT Support Document Management Website Vendor Management App Money Gmail Save Time iPhone Firewall Private Cloud Router Vulnerability Data Security Redundancy Compliance Office 365 Two-factor Authentication How To Wireless Technology Data Protection User Error Business Intelligence Law Enforcement Connectivity Office Tips PowerPoint Risk Management Productivity Facebook Excel Phone System Content Filtering Windows 10 Lithium-ion battery Antivirus Downtime History Tablet Entertainment Value Analytics Retail Memory Mouse Identity Theft Search Networking Phishing Data Management Apps Word Windows 7 Solid State Drive YouTube USB Saving Time Hard Drives Applications Outlook Online Currency IT Management Workers Servers Flexibility Printer IT Plan Business Owner Physical Security Smart Tech DDoS Robot Administration CES OneNote Environment Current Events Unsupported Software Google Drive Maintenance Mobile Device Content Management Running Cable Update Human Resources Work/Life Balance SaaS Skype Training Unified Threat Management Safety Mobile Office Government Customer Relationship Management Cleaning Meetings Data loss Credit Cards Intranet HaaS Public Cloud Best Available Fax Server Black Market People Programming Network Congestion Trending Education Streaming Media HIPAA Internet Exlporer Infrastructure Data Storage Data storage Analysis Encryption Biometrics IT Consultant Humor Sports Comparison Statistics eWaste Licensing Notifications Online Shopping Wireless Internet Business Mangement Samsung Computer Fan Botnet Specifications Company Culture Data Warehousing Twitter Reputation Wearable Technology Files Devices Evernote Social Regulations Windows 8.1 Update Wire Password NarrowBand Recycling Crowdfunding FENG Travel Millennials Wi-Fi Customers IoT Colocation Best Practice Wireless Charging Social Networking Electronic Medical Records Smart Office Chromecast Criminal Workforce Analyitcs Computing Infrastructure Fiber-Optic Flash Hosted Solution Windows Media Player Print Server Paperless Office Legal Laptop Settings Software as a Service Telecommuting Insurance Distributed Denial of Service End of Support Hiring/Firing Cables Virtual Desktop Sync WIndows 7 Students Touchpad IT service Remote Work Virtual Reality Net Neutrality Software Tips Computer Repair Relocation Practices Internet exploMicrosoft Uninterrupted Power Supply Unified Communications Telephony Managing Stress Healthcare Blockchain Domains Root Cause Analysis Google Docs Bloatware Hosted Computing IaaS Thought Leadership Advertising Theft LinkedIn Customer Service Start Menu Patch Management Virus Audit Electronic Health Records Staff Voice over Internet Protocol Entrepreneur Touchscreen HBO Inventory Debate Content Filter Tech Support Cortana Mobile Scam Computer Accessories Charger Screen Mirroring Machine Learning Digital Signature Multi-Factor Security Hacker Fraud Cost Management Frequently Asked Questions Access Control Cameras Storage Hybrid Cloud Shadow IT Google Apps Video Surveillance Professional Services Computer Care Cast Consultant HVAC Strategy Wireless Lifestyle Science Authentication Amazon Instant Messaging Tip of the week Printer Server Addiction PDF Shortcut Spam Blocking Tools Windows 8 SharePoint Nanotechnology Piracy Amazon Web Services Windows Server 2008 Keyboard Worker Commute Cache Password Manager Bluetooth Tablets User Monitor Accountants Experience Two Factor Authentication Assessment Music Television Troubleshooting Techology Public Computer Employer Employee Relationship Data Breach Automobile Emails Books CrashOverride IBM Users Webinar Emergency Worker Supercomputer Content IT solutions Rootkit Video Games Knowledge Audiobook Netflix Scalability Politics Transportation How to webinar Benefits Loyalty Conferencing Smart Technology Windows 10s Battery