Here are the four key steps to enjoying the benefits of bring your own device:
Conduct a cost/benefit analysis while deciding how you will enable mobile and who will have access. Not determining a policy is risky: if you don't, BYOD will “just happen” without controls. Decide on the depth of access to be allowed to each segment of users: “mobile optional,” “mobile enhanced,” or “mobile primary.” Determine mobile device funding and security policies for each segment, then estimate the total IT system and support needed.
Secure and manage
71 percent of CEOs and IT managers say that security is their most significant mobile enterprise challenge. Carefully choose which technologies will be used to manage and secure mobile devices. A smartphone containing confidential data can be stolen or lost—putting sensitive information in the wrong hands. Your mobile enterprise system must be flexible enough to control connections to an ever-growing variety of devices.
Communicate your BYOD policy
39 percent of organisations have already had a data breach due to an employee's or contractor’s lost or stolen mobile device. Do your people understand the risks? Communicate which data may be accessed and which devices are appropriate. Make rules clear to employees up-front—what they may or may not do—and provide lessons on how to comply and get the most out of their access.
Guaranteed, there will be many more calls to your Help Desk concerning a wide variety of devices, and the answers will take longer to find. This is where you need to invest up-front to gain the long-term benefit of granting your employees access through personal devices.