Get Started Today!  217-475-0226

Decatur Computers Inc. Blog

Decatur Computers Inc. has been serving the Decatur area since 2001, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Tip of the Week: What You’ll Need to Leverage BYOD

Tip of the Week: What You’ll Need to Leverage BYOD

Bring Your Own Device has a lot of benefits for businesses, chief among them being giving your users the opportunity to use their own devices for work rather than those provided to them. More often than not, they will benefit from easy-to-use apps on their preferred devices, allowing them to get more done throughout the workday. When you implement BYOD, though, there are various concepts that you have to consider in order to ensure productivity, flexibility, security, and profitability.

Of course, the biggest issue with implementing a BYOD policy is that it can seem a little intimidating to start thinking about. Depending on the type of data being shared, implementing a BYOD strategy might be more complex than you initially think. This possibility is almost guaranteed if your business belongs to a particular industry with specific regulations in mind.

The first part of any BYOD system is making sure that you can track specific devices. You’ll want to know who is in possession of these devices, as well as who can access specific data. You can use a spreadsheet software like Microsoft Excel or Google Sheets to do this. It’s critical that you document all of the following information regarding any employee-owned devices accessing company data:

  • Employee Name
  • Device Make/Model/Serial Number
  • Is there access to File Sharing?
  • Is there access to Email?
  • Is there access to the VPN?
  • Is there access from the VPN?
  • Is there Remote Desktop access?
  • What network devices/drives can be accessed?
  • What apps and licenses are required?

The next step is to determine which kind of mobile management software you’ll be using. If your business doesn’t have one of these, it’s like implementing a security policy with no power to reinforce it. Even though it’s difficult to get users to agree to such a policy, it’s absolutely critical to ensure the integrity of your business’ infrastructure. The typical MDM will provide administrators with access to devices that might not sit well with the average employee. That being said, it’s understandable for a business to manage risk, so hopefully they understand your perspective.

There are other options that aren’t as comprehensive as well--ones that can please everyone without overstepping boundaries. For example, security can be customized for specific applications, and admin controls be used to peer into the devices connected to the network. Admins can also look at specific applications rather than relying on an invasive security system, eliminating a lot of the personal issues that most users might have with such a solution.

Ultimately, you have to be very careful about how you approach mobile device security, as the slightest oversight could potentially create issues for your organization. Does your business need a hand working your way through Bring Your Own Device? Decatur Computers Inc. can help. To learn more, reach out to us at 217-475-0226.

Surveying the Damage of Meltdown and Spectre
Chromebooks Deserve More Credit than You Might Thi...
 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Thursday, July 19 2018
If you'd like to register, please fill in the username, password and name fields.

Captcha Image

Mobile? Grab this Article!

Qr Code

Tag Cloud

Tip of the Week Security Best Practices Privacy Technology Network Security Business Computing Tech Term IT Support Android Hackers Malware Google Software Cybersecurity Data Recovery Smartphone Business Management User Tips Internet Data Innovation Email Small Business Managed IT Services Data Backup Ransomware Backup Cloud Productivity Artificial Intelligence Efficiency Windows 10 Cybercrime Business Technology Mobile Device Management Phishing Communications Cost Management Computer IT Management Business BDR Hardware Applications Data Security IT Services Encryption Gadgets Blockchain Antivirus Collaboration Patch Management Network Hard Drive Managed IT Services Update Saving Money App Access Control Outsourced IT Data Breach Office 365 Alert Windows Automation Apps VPN Server Operating System Internet of Things Bitcoin Facebook SaaS Maintenance Social Engineering Remote Monitoring Money Microsoft Office Social Media Search Gmail Touchscreen Spam Save Money Word Vulnerabilities Document Management Digital Microsoft Start Menu Law Enforcement Passwords Bandwidth Browser Scam Holiday Websites Laptop Smartphones Data Management Data loss Tech Terms Business Continuity Disaster Recovery Hacking Project Management Mobile Device Data Protection Going Green Managed Service Provider Big Data Backup and Disaster Recovery Samsung Compliance Google Maps Hard Drive Disposal Cloud Computing Telephony History Specifications Unified Threat Management YouTube Bluetooth Downloads Piracy Download Emergency Microsoft Excel Regulations email scam VoIP IBM Television Settings Wireless Headphones VoIp Software License Mobile Security Upload Vulnerability Cryptocurrency Hosted Solutions Automobile Printer Accountants Audit Mobile Devices Mouse Best Practice Administration Cleaning Mobility Two-factor Authentication Trends DDoS Employer-Employee Relationship Paperless Office Corporate Profile Training eWaste Time Management Managed IT Unsupported Software Computers Information Technology Database Multi-factor Authentication Gamification Password Equifax Computer Care Robot Google Calendar Mobile Technology Nanotechnology Tactics Device security Excel Unified Threat Management Startup Augmented Reality Outlook SharePoint Upgrades Addiction Website Content Disaster Tip of the week Vendor Mangement Computing Infrastructure Google Docs Virtual Reality Distributed Denial of Service Access Screen Reader Machine Learning BYOD Running Cable Business Mangement Solid State Drive WiFi Legislation Unified Communications Networking Budget Company Culture Redundancy Freedom of Information Telephone Systems Spyware Communication IT Support HTML Information Knowledge Cortana Cabling Software as a Service Wireless Tablet Virtualization Printing Business Cards Identity Theft Network Management News Consultant Analytics Conferencing Travel Virtual Assistant Uninterrupted Power Supply How to Apple Government Comparison Desktop Service Level Agreement Fake News Chromebook Devices Username Worker Google Drive Virus Emails Legal Downtime Twitter Office Users CrashOverride Office Tips Managing Stress Multi-Factor Security Windows 10 Marketing

Latest Blog

Every online account will inevitably ask you to create two different credentials: a username and a password, both of which need to be kept as secure as possible. But what exactly is a username used for, and why is it such an important part of computing? For this week’s tip, ...

Latest News

Decatur Computers Inc. is proud to announce the launch of our new website at http://www.decaturcomputers.com. The goal of the new website is to make it easier for our existing clients to submit and manage support requests, and provide more information about our services for prospective clients.