Top 10 WYOD Best Practices expand beyond BYOD
Top 10 WYOD Best Practices – Employees bringing their own smartphones into the workplace started the BYOD trend requiring enterprises to deal with the serious security implications that come from these devices. The decision for employees to wear their own device (WYOD), such as an apple watch that can link to your Wi-Fi; capture audio, video and data; store; and transmit poses similar problems for IT departments. Employees and individuals outside of the enterprise can use these devices, sometimes discretely, to access and share business content.
This puts corporate data and infrastructure at risk, and reinforces the need for IT managers to focus on securing the content, rather than the device that’s in use. Wearable devices simply add another level of access and security concern to what we’ve already seen with the BYOD trend.
Here are top 10 best practices for WYOD:
- Have a strategy for how, when and why WYOD devices can be used
- Implement an acceptable use policy
- Identify the connectivity options that are available to both internal and external users
- Approved devices should be easily connected to the available secure access points
- Define a management process for the WYOD devices
- Plan for the activity WYOD devices will add to the network
- Make collaboration tools a priority
- Secure the end points and isolate sensitive/confidential information and locations
- Be prepared for little to no advance notice on upgrades
- Formalize your 7 x 24 support
For more information on this go to WYOD Policy.