With the BYOD (Bring your own Device) programs now spreading across multiple sectors, experts are wondering what the endgame is now. IT Business recently sat down with John Wei, the chief technology officer at HP Enterprise for its Ally Financial account, asked him how his team typically approaches training employees on mobile working best practices.
"Establishing/maintaining guidelines around the platforms and devices enterprise will support, to make sure the devices your employees buy have the computing power necessary to run the enterprise mobile infrastructure and mobile applications effectively," was cited as the first crucial step. "Providing platform (e.g., iOS/Android) level trainings through video, user groups, blog sites, ideally establishing departmental-level mobile device gurus for easy access and ready help. These gurus may be viewed as super-users."
Two more things businesses must keep in mind, according to Wei, include designing applications with intuitive user interfaces ensuring seamless integration with the existing enterprise utilities. This will help promote a much smoother learning curve for both sides than if a company were to simply open the floodgates to a BYOD program without proper foresight.
Some best practices for security
When asked if the era of company-owned devices is coming to an end, Wei told IT Business that it is a new age now where many models can coexist and thrive under the same program and network.
"In many aspects, the right answer is dependent on the target user base, company culture and the nature of the business," he told the website. "Overall, I do believe that we will see a gradual decline of IT dictating mobile operating environments as a percentage of the devices brought into the workplace. Even in companies where IT will retain ultimate control, user communities are increasingly having a direct say in the final decisions."
Companies cannot simply go into a BYOD program without knowing what they are going to do as far as security practices are concerned. Information-Management suggests the first thing any company should do is implement an option for being able to remotely wipe the device, which can be achieved with a quality mobile device management program. With this in place, even if a device with sensitive data is lost or stolen, companies have ultimate control over its fate.
Data Security News from SimplySecurity.com by Trend Micro.