- End users are bringing in personal mobile devices to increase job productivity.
- IT has difficulty managing these devices and ensuring the security of the network they connect to, and the data stored on them.
- Depending on the level of mobile security required, IT can implement policies, conduct training, or install third-party infrastructure to mitigate the risk of allowing personal mobile devices on the corporate network.
Our Advice
Critical Insight
- Allowing personal mobile devices increases employee productivity and job satisfaction, but focusing on user compliance is critical to success. Be prepared to develop and enforce a personal mobile device policy to minimize the chance of failure.
- There are four levels of mobile security: Minimum, Basic, Enhanced and Lockdown. Assess what level the organization needs to maintain and act accordingly to minimize risk of security breaches.
Impact and Result
- Maximize your success and credibility with a personal mobile device acceptable use policy that clearly defines IT’s control over personal mobile devices.
- Prepare to get tough. If employees refuse to play by the organization's rules, bar their personal device from the network.