Understanding BYOD

[et_pb_section fb_built=”1″ _builder_version=”4.5.2″ background_color=”#fafafa” width=”100%” module_alignment=”center” custom_margin=”0px|0px|-55px|0px|false|true” custom_padding=”0px||0px|0px|true|false”][et_pb_row custom_padding_last_edited=”on|phone” _builder_version=”4.5.2″ background_color=”#ffffff” background_size=”initial” background_position=”top_left” background_repeat=”repeat” width=”100%” max_width=”1600px” custom_padding=”80px|50px|80px|50px|false|false” custom_padding_tablet=”” custom_padding_phone=”|20px||20px|false|false”][et_pb_column type=”4_4″ _builder_version=”3.25″ custom_padding=”|||” custom_padding__hover=”|||”][et_pb_text _builder_version=”4.5.2″ header_font=”|600|||||||” header_text_align=”left” header_text_color=”#2864ad” header_font_size=”42px” header_line_height=”52px” header_2_font=”|300|||||||” header_2_text_align=”left” header_2_text_color=”#000000″ header_2_font_size=”36px” header_2_line_height=”46px” header_3_font=”|600|||||||” header_3_text_align=”left” header_3_line_height=”37px” header_4_font=”|600|||||||” header_4_text_align=”left” background_size=”initial” background_position=”top_left” background_repeat=”repeat” hover_enabled=”0″ header_font_size_tablet=”35px” header_font_size_phone=”32px” header_font_size_last_edited=”on|desktop” header_line_height_tablet=”45px” header_line_height_phone=”42px” header_line_height_last_edited=”on|phone” header_2_text_align_tablet=”” header_2_text_align_phone=”” header_2_text_align_last_edited=”on|desktop” header_2_font_size_tablet=”32px” header_2_font_size_phone=”30px” header_2_font_size_last_edited=”on|desktop” header_2_line_height_tablet=”42px” header_2_line_height_phone=”40px” header_2_line_height_last_edited=”on|phone” header_3_text_align_tablet=”” header_3_text_align_phone=”” header_3_text_align_last_edited=”on|phone” header_4_text_align_tablet=”” header_4_text_align_phone=”” header_4_text_align_last_edited=”on|phone”]

Understanding Bring Your Own Device (BYOD)

BYOD Thumbnail

We now live in a world where virtually everyone has a mobile device that goes everywhere with them. As such, this presents a new challenge when it comes to keeping your IT infrastructure secure, providing malicious entities more access points than ever.  You can mitigate the risk that this trend brings with it by implementing a conscientious and thorough Bring Your Own Device (BYOD) strategy, in fact, you  can make your staff’s devices work for your company.

The Trends

The majority of employees already bring their smartphones to work regardless of their companies device policy, and over 87% of employers rely on their employees ability to access a mobile device. Also, having your employees use their own mobile device assesses a $350 value per employer per year, and they tend to be more efficient. This makes a Bring Your Own Device strategy an absolute necessity to keep your infrastructure secure. but there is plenty of grey area in addressing it. 

Effective Strategy

The first thing to consider is if your company would even benefit from leveraging a mobile device strategy, chances are you will but that is the first step. If you do, every company will be different when forming a mobile device policy by assessing their needs and also security requirements. If you work in a top secret compound you likely won’t even have the option for a mobile device. But for the overwhelming majority of us the first thing to determine is the elements of your infrastructure that needs protecting. Consider who has access to those elements and what devices and applications they use for their work and what are the security measures and software you will be using. Some of the main policy points you should be covering are:

1. Identify the devices will be allowed on the network.
2. Implement a comprehensive security strategy.
3. How will foreign devices access data on the network, if at all.
4. Document who owns what on the mobile device.
5. Determine applications not allowed on the device.
6. Create a strategy to quickly and securely add and remove users.

Once you have that all worked out you now have a system that will reduce costs and increase efficiency! But what are the downsides?

The Human Factor

Conversely, as a business owner you’ll also need to to vigilantly train your employees to be aware of how their mobile devices can be compromised frequently. It is human nature to fall into a rhythm and forget and relax, your business will need to frequently remind/train and update your acceptable use policy to remain effective.

The IT professionals at MyTek can help you by providing all relevant information so that you can make informed decisions about what content to block and what content to make accessible to maximize your organization’s productivity. 

At MyTek we promote small and medium-sized business efficiency by disseminating expert IT services and support. For more information about our vast array of IT services including comprehensive mobile device management and IT consulting, contact us or call us today at 623-312-2440


Table of Contents


Our goal is to reinvent the managed IT experience for growing Arizona businesses through a partnership with no long-term commitments, technology options that are flexible to meet your needs and infrastructure and strategy that position your technology as a competitive advantage.

Download Our Price Sheet