Does anyone in your business have this many devices? (Image: kawanet on Flickr.)
As any marketer should, I watch streams of Twitter hashtags and have Google Alerts set up to monitor topics in my business realm.
For nivio, this means I keep a close eye on #DAAS (desktops as a service) #SMB (small-medium business), #VDI (virtual desktop infrastructure) and #BYOD (bring your own device), among others.
Of these feeds, bring your own device is by far the most interesting. Though the concept isn't new - I've been using my personal devices for work in some form for more than a decade - BYOD as a business problem is receiving a lot of media coverage. And, as with most new tech challenges, the coverage is divided on whether BYOD's cost-savings and access benefits really outweigh the security risks.
Your business is likely already engaging in BYOD. If your staff use personal devices for work, either as their primary system or when they work remotely via laptop, tablet, or smartp hone, your business, too, is part of the BYOD trend. And, you're far from alone: according to a Spiceworks survey (PDF link) more than 75% of small businesses are actively managing personal devices as part of their IT strategy.
But what do small and new business really need to know about BYOD?
Most businesses already support BYOD in the workplace, and if you don't, the chances are your staff are accessing information and files remotely on personal devices anyway.
Having policies in place to limit remote access could be a deterrent and reduce the risks your business faces. However, these require additional IT infrastructure to enforce.
Plus, employees want remote access for flexibility in when, where, and how they work. They want to get information while on the go. And they don't want to juggle a company smart phone and tablet along with their own personal devices.
Data security, especially for law, health, and accounting firms, is crucial. Your business needs to ensure information is secure and that you aren't exposed to undue risks by allowing remote access.
You need to integrate employees' own devices into your existing systems, and give your staff support to troubleshoot problems when they occur.
Generally, you have two options for mobile security;
Every business is different, but many companies can see significant cost savings from BYOD.
You'll almost certainly save on hardware costs, and many companies will also save on the software and maintenance costs that go along with running a fleet of devices.
Lara Franklin manages content and marketing for nivio, a cloud-based platform providing comprehensive IT infrastructure enabling BYOD and anywhere access for businesses.
Given recent coverage of 'bring your own device' (BYOD), the phenomenon which sees employees using their own IT for work, you could be forgiven that it's open season on IT in the workplace.
There are undoubted benefits from giving staff freedom to choose their own IT equipment. But before you open the floodgates and let tablet computers, iPhones and other gadgets into your company, it's worth considering the downsides too.
James Easton, right, from IT modelling and data visualisation company Real Status, reckons BYOD can create five key issues:
Viruses, malware, spyware and hackers can jump the security perimeter by being brought into the company on an employee's own device. Once inside your business, they may be able to bypass the firewalls that monitor your network.
When you have a wide range of devices in your business, it can be hard to apply security updates consistently across all of them. Falling behind with even one update can allow a new virus or piece of malware to slip through undetected.
Every mobile device should have data encryption (to scramble data, keeping it safe if the device is lost), password protection and the ability to lock users out if a password is repeatedly entered incorrectly. However, this is tricky to enforce across a wide range of devices.
BYOD makes it harder to keep track of staff going onto Facebook and Twitter, or playing with apps which would might normally break your IT policies.
As soon as BYOD becomes TYOD, or 'take your own device,' any data stored on each device is vulnerable. For example, when employees share their devices or passwords with other people, when their devices are lost or stolen or when data is accessed over public Wi-Fi hotspots.
This isn't to say that BYOD is fundamentally flawed. We've explained the benefits before, and there's a certain inevitability to it in any case. It's just a good move to be wise to the risks before you embrace it wholeheartedly.