5 red flags when employees work on their own devices
(NC) BYOD or “bring your own device” has gained popularity over the last few years. This is where employees, who have grown weary of using their old, inefficient office computers and telephones, bring in their own modern laptops, tablets, and smartphones to use at work. But allowing your staff to do this is a tricky practice and should only be undertaken with proper research and cautious planning. If that seems daunting, rest assured that there are simple steps small businesses can take to protect company information on wireless devices.
Here are five key factors to consider in a BYOD plan:
Maximize productivity among your users
If you choose to, you can control which websites your employees can access when they are using their own web-enabled devices in the office. You can allow them access to certain work-related websites or you can block certain websites. For example, many employers block Facebook and Twitter to prevent staff from using work time unproductively. One way to do this is to use a parental control software product.
Secure your business data
Smart phones, laptops, and tablets are lost or stolen daily. So when your employees carry personal devices storing company information, you need to have measures in place to protect it. Remind your BYOD employees to be vigilant when transporting their personal devices to and from work. For example, your IT administrator should make sure that all company data has been backed-up in-house, and the off-site copies have been password-protected.
Retrieve confidential data
When an employee leaves your business, you need a process in place to manage their access to company data on their device. If there is any company software or data residing on that person's portable device, it all belongs to you and must be returned or removed. There is a component of most quality anti-malware software that, when set up in advance, will remotely wipe the information that is stored on the ex-employee's device. To set this up, contact an expert at your wireless provider like Rogers Small Business Specialists or TechXpert for Small Business.
Protect from malware infestation
Just like all office computers, BYOD devices should be protected from viruses and malware so consider investing in good quality security protection that will be loaded onto the device. This is a relatively inexpensive price to pay for valuable protection and peace of mind.
Word count: 398
Attention Editors: Please note that this article is for use in Ontario, New Brunswick and NewFoundland only.
Articles are provided free of charge. Articles appearing on web sites, must credit www.newscanada.com. Articles appearing in Print, must credit News Canada with (NC) at beginning of an article or – News Canada at the end. Any source/sponsor of the information quoted in the text must also be identified as presented. Images are only to be used with corresponding editorial copy. Usage of News Canada articles constitutes your acceptance of these terms and an agreement between you and News Canada.