An empowered employee is a happy employee is a productive employee. So it goes. Thus by taking the reins off staff members and allowing them to utilize their favorite device (whether it be Smartphone or Tablet, or both) wherever and whenever they want, they become more accessible, more engaged, more responsive and highly flexible. Cymax wholeheartedly supports Bring Your Own Device (BYOD) but it comes with its own set of challenges,( security and privacy to name but two). The key to BYOD success is to ensure ‘all your ducks are lined up’ before the rollout takes places. A sound BYOD strategy, preferably developed and maintained by a highly qualified ‘Business IT Specialist’ (like Cymax) will ensure you avoid the pitfalls and maximise the benefits. Sean Dendle of Cymax offers ‘10 Rules for BYOD’ to help you on the right path.
What is BYOD?
Definition: “Bring your own device (BYOD) is an alternative strategy allowing employees, businesspartners and other users to utilize a personally selected and purchased client device to execute enterprise applications and access data. Typically, it spans smartphones and tablets, but the strategy may also be used for PCs. (Gartner)”
The rapid proliferation of mobile devices entering the workplace feels like divine intervention to many IT leaders. It’s as if a voice boomed down from the mountain ordering all of the employees you support to procure as many devices as possible and connect them to corporate services en masse. Bring Your Own Device was born and employees followed with fervour.
There’s no sense pretending it isn’t happening or saying, “We don’t let our employees do that.” The truth is, they’re doing it already and will continue to burrow noncompliant devices into your network with or without your permission. Forrester’s study of US information workers revealed that 37% are doing something with technology before formal permissions or policies are instituted1. Further, a recent Gartner CIO survey determined that 80% of employees will be eligible to use their own equipment with employee data on board by 20162.
This raises the inevitable question: how will you support workforce desire to use personal apps and devices while allowing them to be productive in a secure environment that protects corporate data? The Top Ten Rules for BYOD show you how to create a peaceful, secure, and productive mobile environment.
1. Benjamin Gray and Christian Kane, “Fifteen Mobile Policy Best Practices,” Forrester Research, January 2011.
2. Ken Dulaney and Paul DeBeasi, “Managing Employee-Owned Technology in the Enterprise,” Gartner, 2011.