BYOD policies are a must
With the advent of Bring-Your-Own-Device – BYOD and the ever increasing mandated requirements for record retention and security CIOs are challenged to manage in a complex and changing environment.
94% of companies are planning to allow employees to bring their own mobile devices to work by 2013. By following five best practices – and avoiding five others – companies can significantly reduce their risks and protect their sensitive company information.
Bring-your-own-device (BYOD) is a phenomenon many companies are wrestling with. It’s easy to see why. By 2015, 70% of the Internet-capable your employees will buy will be made by consumer behemoths such as Apple and Samsung, and not by traditional IT favorites such as RIM, HP, and Microsoft. Meanwhile, many companies have realized that they can save significantly on their telecom expenses if their employees are footing part (or all) of the monthly bill. For a company with 500 employees, that could add up to $300,000 or more annually.
But BYOD isn’t complicated. The trick with managing successful BYOD programs is to set clear ground rules, create sensible security policies, and to devise a strategy for navigating the privacy minefield.