• Skip to primary navigation
  • Skip to main content
  • Skip to primary sidebar
  • Skip to footer
Housing Technology logo

Housing Technology

Housing | IT | Telecoms | Business | Ecology

  • Free Subscription
  • Search Archive
  • Home
  • Research
  • Magazine
  • Events
  • Recruitment
  • Blog
  • On Demand
  • Contact
Home / Magazine Articles / Bring your own disaster?

Bring your own disaster?

From: Marc Begg, Sales director, Peak-Ryzex

Sir – BYOD has sometimes been labelled ‘bring your own disaster’, but is that with good reason? It certainly has the potential to give IT managers a headache, through damage to or infiltration of the company’s IT infrastructure, and the trend is not going away.

However, BYOD should be viewed as part of an ongoing mobility strategy and not just as an isolated issue. With the increased use of personal smartphones and tablets to access enterprise data in the workplace, IT managers should be looking at their whole mobility situation now rather than when problems happen.

Putting a BYOD plan in place immediately, as part of your mobile strategy, will help to protect corporate data. It would be great if you can employ a chief mobility officer (CMO) to make those ‘anything that moves’ decisions relating to bringing devices into the workspace. If not, think about outsourcing your mobile technology management to a trusted partner. Both options ensure that you have a plan to manage any mobility-related issues, including networks, line-of-business applications, devices and security issues that can leave organisations open to a cyber attack.

Allocate a BYOD security budget now; it’s the horse and stable door scenario as it’s better to prevent a security breach than having to find a budget to clean up afterwards. Training your employees on best practices and having a security policy from the outset will also help to avoid these costly situations.

Many companies don’t realise that missing devices account for nearly half the security breaches. The key goal is to strike the right balance between making employees aware of potential security risks without compromising their privacy as their own data has to be considered as well. Don’t open up your whole network; be selective by working on a ‘need to access’ basis and protecting your corporate data on the device, not all of the device’s data.

Mobile device management (MDM) solutions can be useful tools when it comes to developing configuring security, encrypting corporate data and, when necessary, remotely wiping a lost or stolen device of that corporate data, but not necessarily the individual’s data.

With mobility trends and the consumerisation of IT expected to accelerate, it’s a good time to look at your mobility strategy, with BYOD as a key component. Remember, your aim should be to mobilise the user and not just the application.

See More On:

  • Vendor: Peak-Ryzex
  • Publication Date: 033 - May 2013
  • Type: Letters

Primary Sidebar

Most Recent Articles

  • Free cyber-defence tools from NCSC
  • Learning from history
  • Grand Union Housing gets connected with Aico HomeLink
  • The silences in the system: Predicting and preventing damp and mould
  • Looking back and to the future: Cyberthreats in social housing
  • Hyde signs repairs contract with Totalmobile
  • Fuelling high performance automation
  • Morgan Sindall’s Carbon Zero decarbonisation tool
  • An ethical approach to arrears
  • Housing and the ever-evolving workplace
  • Supporting residents with home safety risks
  • Less innovation & more service design at RHP
  • Ateb Group outsources IT help desks to Central Networks
  • Capital Letters partners with Evo Digital to tackle homelessness
  • Calico appoints M247 for digital transformation
  • 24/7 care requires 24/7 technology
  • Govtech trends for 2023
  • Are you ready for business process automation?
  • Lincoln council moves to the cloud with Civica
  • Why do IT business improvement projects fail?
  • Flagship and Ebrik launch augmented reality app
  • Following the golden thread
  • Setting the standard for carbon-monoxide protection
  • The business case for data
  • Digital twins – When, not if…
  • Using data to build communities
  • The cyber-security jigsaw’s missing piece – Managed detection & response
  • Cyber-security challenges in housing
  • Digitalising retrofits with SHDF & HomeLink
  • Tips for improving care and support

Footer

Housing Technology
  • Instagram
  • LinkedIn
  • Twitter
  • YouTube
  • Contact
  • Free Subscription
  • Book an event
  • Blog
  • Search All Articles
  • Research
  • Update Your Subscription
  • Privacy Policy

Welcome to the housing Technology – Trusted Information For Business Professionals in HOusing

Housing Technology is the leading technology information service for the UK housing sector and local governments. We have always believed in the fundamental importance of how the UK’s social housing providers use technology to improve their tenants’ lives.

Subscribe to Housing Technology to gain market-leading research, unsurpassed peer networking opportunities and a greater understanding of your role to transform your business.

Copyright © The Intelligent Business Company 2022 | Terms and Conditions | Privacy Policy
Housing Technology is published by the The Intelligent Business Company. A company with limited liability. Registered in England No. 4958057 | Vat Registion No. 833 0069 55.

Registered Business Address: Hoppingwood Farm, Robin Hood Way, London, SW20 0AB | Telephone: +44 (0) 20 8336 2293

htc23 pop banner