Growth Customer Experience Productivity Business IQ Trends Success Stories Tech Solutions Subscribe Tech Enquiry
Productivity

BYO Device: Managing personal devices in the workplace

Simon Sharwood
Technology Journalist

Simon Sharwood has written about technology since the early 1980s and still isn't bored

Simon Sharwood
Technology Journalist

Simon Sharwood has written about technology since the early 1980s and still isn't bored

BYO mobile devices can make staff more productive at work, but what are the pitfalls?

On weekends I like to go for long bicycle rides that I track with my phone, then share the data on a social network for cyclists. That means I need a waterproof phone with a hefty battery.

Image shows a man sitting in a café using his smartphone and laptop for work. BYO mobile devices can be a challenge in the workplace.

That’s not the kind of phone most people use at my workplace, but thankfully my boss has a bring your own device (BYOD) policy that means the team can use their preferred phones, tablets and laptops at work.

BYOD is popular because it lets workers use the devices they prefer and make them most productive.

But BYOD means the phone I use to track bike rides is also the one I use to call clients, correspond with suppliers and store some work-related documents. And, of course, that phone also has the stuff you’d expect on anyone’s personal device: TXTs to friends, personal emails, photos of my kids, banking apps and so on.

This is where BYOD gets a little messy, because what would happen if I left that phone – and all those work-related emails, documents and details stored on it – in a cafe after a ride? And what if my boss and I had a dispute and, before kicking me out the door with all of my personal possessions in a box, she decided to wipe all of the business information from my phone, taking my family photos with it?

The good news is that employers can easily deal with these issues through a combination of policy and technology.

Baseline policies

To make BYOD work for your organisation, set two baselines: what data can be accessed and stored on a BYO device and minimum tech specifications.

Outlining in writing what data you and a worker can access and retain on a BYO device avoids future disputes about what an employer can reasonably expect to access, delete or retrieve from a device, for example, family photos. It can also confirm if an employee can keep professional contacts, made as part of the job and stored on their own device, when they leave the business.

Having minimum tech specifications for BYO devices is important because not every device runs the latest and most secure software and not every person is diligent about installing each new update or security patch.

So, instead of risking an employee bringing in a clunky old laptop, riddled with malware and security vulnerabilities, you can insist that any personal device must meet minimum standards before it can access your business systems.

The fact that some software won’t run on old devices is also an issue. If an employee’s phone can’t run an application needed to do the job, they can’t use it as their work phone. Outlining in the first place the minimum specs required means both you and the worker are spared an unnecessary moment of friction.

Insist on security

Security policies are another must-have in a BYOD policy.

It should start with making a strong password mandatory (see our advice from last year). Strong passwords mean devices are harder to crack if they are lost or stolen.

You can insist on encryption, too, so that the files on laptops cannot be read without the appropriate password. Windows (BitLocker) and Mac OS (File Vault) both have this feature, as do iPhones and Android devices.

Also provide security software, with automatic updates, to your team. The policy should make it plain that your employees must install any patches from software vendors whenever they become available. And, if possible, you should monitor BYO devices for non-compliant software and force users to update.

Monitor and segment

Although that last recommendation may sound like a hard ask, you can monitor BYO devices of all types with an emerging class of tool called enterprise mobility management (EMM) or mobile device management (MDM).

Both EMM and MDM tools can be driven from a website and allow you to manage many aspects of a device’s operations, and they’re another reason why you need clear policies around data access for BYO devices. Defining these policies before you shop for EMM or MDM tools will help you make the right choice and set the right expectations for staff.

Some EMM and MDM tools let you define segments inside a device, each accessible with different passwords, so that you can separate work and play. Segmentation of this sort means that work files and applications will only ever reside in the work-defined segment of a device. If an employee leaves a job, that work-defined segment of the device will just disappear.

Setting sensible policies and backing them with BYOD management tools will help to keep staff happy, working productively with the devices they prefer while doing so in a secure environment you control. 

Worried about BYOD security? Read our guide to secure remote access.

Find Out More

5-minute fixes for your cyber security
Business IQ
Business IQ
5-minute fixes for your cyber security

Safeguarding your business requires an approach that is tailored to your needs. This takes an investment of time and money, and assistance from people with the right knowledge ...

Cyber security firm, Penten, celebrates winning the 2018 Telstra Business of the Year Award.
Success Stories
Success Stories
Prevention through deception Penten’s recipe for success

Canberra-based cyber security company, Penten, is the 2018 Telstra Australian Business of the Year. The business uses cyber deception strategies to protect Australian governmen...

A collection of letters laid out like a word search.
Trends
Decode business tech jargon

Your go-to resource to decode tricky tech jargon. With new technology comes new terminology. So many acronyms and jargon words are created on the internet all the time, which c...

Is your business cyber-secure
Trends
Cyber security: Is your business cyber-secure? Take our interactive quiz

Cyber security is a hot topic across the business world. Whether your business is big, small, or somewhere in between, data protection is now essential for you to gain and main...