Like most IT departments you are probably facing increasing pressure from users to implement a BYOD strategy. But where do you start?
Here we share our Top Ten Tips – a quick blog post today, we hope you find it useful.
- Who are you opening up your BYOD policy to, all users? senior users only?
- What level of access will each of these users need?
- What applications will be accessible? Suggest you start small and build up
- Will you be providing internet access, application access or both?
- If you are allowing sensitive data on personal devices how will you protect that data?
- How will you secure the personal devices accessing the network – encryption, password protection, remote wipe etc. Consider the minimum set of security requirements you’ll need.
- How will your policy protect users own personal data on their personal devices – is this something you’ll take responsibility for?
- How will you protect the devices themselves?
- Consider your responsibilities for reimbursing users – will you consider any compensation for some of the cost of the devices used? (or the network operating costs)
- Make sure permissions are enforced and followed up, and that you know which devices are /are no longer accessing the company network.
Keep an eye on this blog for our following topics on:
Why access control is important in a BYOD Strategy.
Providing guest access as part of your BYOD Strategy.