Set a Mobile Policy for Your Own Good
Mobile devices (as their name would suggest) go everywhere, including the modern office. As such, it is likely that your employees will want to take advantage of their capabilities to accomplish more of their responsibilities and tasks. This can be advantageous to your business, assuming that you have a well-thought-out mobile device policy in place.
Let’s discuss a few things that need to be included in one of these policies so you can make yours as effective as it can be (whether you’re first implementing it or you’ve had one for a while that needs a refresh).
Keeping Things Secure
While mobile devices can provide considerable benefits to your business, these benefits will be moot if your security is compromised via these devices. Therefore, you need to make sure that your mobile device policies contain guidelines to help - and yes, make - your employees use their devices more securely. While these examples aren’t a comprehensive list of precautions to make (and the same can be said for any of the examples in this blog), they do help illustrate the kinds of precautions and restrictions you will have to enforce:
- All mobile devices must be protected by a password that meets the standards set by your company’s guidelines, and set to lock automatically if idle for a set amount of time.
- Any applications must be approved by the company before they can be installed and used for work purposes.
- Any devices not included in the BYOD policy, or are not supported by it, may not connect to the business’ network.
- If a device is misplaced, IT detects a threat on it, or the owner leaves the company, IT may wipe the device to protect company data.
Of course, while you always need to have security measures in place, it can greatly help to have the means of minimizing threats before any can materialize… especially those that originate from inside your organization. Your mobile device policy is a good place to outline the protections you have in place, and what you reserve the right to do with them to protect the good of the company. For instance:
- All devices that are lost or stolen should be reported to IT within 24 hours, and the mobile carrier should be notified immediately.
- Any employee who uses their mobile device does so knowing that it signifies their consent to the acceptable use policy, and their intention to abide by it.
- Any mobile device may be disconnected from the company network or have its access to services revoked without notice.
- While IT will make their best efforts to preserve a user’s data, any device that needs to be remotely wiped for security purposes will be wiped to protect the company. This means the user is responsible for maintaining their own backups.
Acceptable Device Use
Finally, you need to make sure you include a section in your guidelines that dictate how these devices can be used in the office (or out of it, for that matter) to conduct work tasks. Some will be based on your personal preferences, while others are more related, again, to your security. A few sample policies that your overall mobile device policy should include are:
- Designated guidelines clarifying the differences between business and personal use of devices, and what is acceptable for either on company time - and what is not allowed at any time, like storing illegal materials or conducting harassment.
- A comprehensive list of business materials and resources that an employee can access with a mobile device.
- All approved applications that may be downloaded, as well as those that may not be, such as those not acquired through Google Play or the App Store.
- Websites that may not be accessed via the business' network.
Interested in learning about a mobile device policy, and what it needs to contain, in more detail? Reach out to us! Our professionals can walk you through each point in detail, assisting you in creating and enforcing protections for your company that work. Give us a call at 603-889-0800.
- Tip of the Week: Awareness is Key to Mobile Device Security With more and more businesses relying on mobile devices for their business they have to be sure that the use of these devices doesn’t present security issues for the company. With all that is happening in business computing today, finding out how you can protect yourself in lieu of the prevalence sm...
- How to Balance Your IT’s Value Against the Cost No matter how you look at it, technology is expensive. You’ll rarely look at your IT invoices without cringing a little on the inside. However, it’s important that you take a glance at these every once in a while to understand just what you’re getting from your technology budget. Ultimately, you wan...
- Spend More Time Managing Your Business, and Less Managing Ve... Chances are, you most likely view your vendors as a necessary evil. While you have to work with them to get the things that your business needs to function, it’s hard to not think of everything else that could be accomplished in the time you spend dealing with them. Unfortunately, there are even mor...
- Co-Managed Services Can Help Build a Better Business Let’s say that your organization has experienced considerable growth over the past couple of years. It’s not outpacing your IT infrastructure, and the cracks are starting to show in more ways than one. This makes it difficult to plan for the future, implement new IT initiatives, and react to issues ...
- Is a Better Camera a Good Reason to Buy a Smartphone? Today the smartphone camera has become one of the biggest selling points when consumers look to purchase a new phone. This is largely because it is crucial to the use of many of the applications that your average user uses the smartphone for. It just goes to show that in less than two decades how mu...
- IoT Security is a Key Business Concern The Internet of Things is everywhere, which means that potential security risks are also everywhere. Your business needs to take the risks presented by the IoT into account and prepare accordingly. What are You Willing to Risk?When devising a policy for your company concerning the IoT, you need t...