Once the BYOD movement has reached your organization, it's important to set up a bring-your-own-device policy and a mobile device security policy. Users need to know up front what they can and can't do with their devices.
When a bring-your-own-device policy is in place and users know what's expected of them, they also know the consequences for not complying. With an acceptable use policy and a mobile device security policy, IT and upper management can lay out the rules and hold users accountable for their actions.
In this part:
BYOD policy basics
Creating a bring-your-own-device policy
If IT and management don't create a BYOD policy, they're just asking for management and security nightmares. When you're crafting your bring-your-own-device policy, make sure you consider acceptable use, device selection, reimbursement, applications and security. And don't forget to write agreements for users to review and sign.
BYOD policy 101: Defining and enforcing a successful program
Even the most basic BYOD policy requires a section that defines the rules and another section on how the organization will enforce them. You might already have the tools you need to enforce your policies; ActiveSync is a popular option, as are third-party apps.
BYOD security policies
BYOD security policy at heart of personal device security
You might think that mobile device management (MDM) is at the core of BYOD security, but it's only as good as the BYOD security policy that lays the foundation. MDM can help you manage devices, but with a mobile device security policy, users can go to bat for IT.
Put BYOD risks to bed with a mobile device security policy
Experts say that organizations need to put together formal mobile device security policies before looking into MDM systems. The risks of BYOD are many. Having policies set up and doing your research on MDM will ensure that IT manages devices effectively.
Hot topics: Mobile security, bring-your-own-device policy issues
Breaking news: IT departments are worried about securing employees' smartphones and tablets. Ok, so it's not really breaking news, but mobile security and BYOD policy issues, such as malware threats and app security, are still without easy or comprehensive solutions.
Using VMware View 5 to address BYOD policy security challenges
Even if your company has a BYOD security policy, mobile devices can pose serious security challenges. IT should be ready to address them and can do so with VMware View 5, which lets admins virtualize desktops. When users access their desktops from mobile devices, it lessens the risk of data loss.