<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>Bring Your Own Devices (BYOD) Archives - TechTastic</title>
	<atom:link href="https://www.techtastic.biz/topics/bring-your-own-devices-byod/feed/" rel="self" type="application/rss+xml" />
	<link>https://www.techtastic.biz/topics/bring-your-own-devices-byod/</link>
	<description>Fantastic Technicians</description>
	<lastBuildDate>Tue, 25 Sep 2018 00:08:33 +0000</lastBuildDate>
	<language>en-US</language>
	<sy:updatePeriod>
	hourly	</sy:updatePeriod>
	<sy:updateFrequency>
	1	</sy:updateFrequency>
	<generator>https://wordpress.org/?v=6.8.1</generator>
<site xmlns="com-wordpress:feed-additions:1">151403479</site>	<item>
		<title>The Good, The Bad, and the Ugly of Mobility &#038; Bring Your Own Device</title>
		<link>https://www.techtastic.biz/bring-your-own-devices-byod/good-bad-mobility-bring-your-own-device/</link>
					<comments>https://www.techtastic.biz/bring-your-own-devices-byod/good-bad-mobility-bring-your-own-device/#_comments</comments>
		
		<dc:creator><![CDATA[Zion Finck]]></dc:creator>
		<pubDate>Fri, 13 Jul 2018 06:23:14 +0000</pubDate>
				<category><![CDATA[Bring Your Own Devices (BYOD)]]></category>
		<category><![CDATA[Cloud Computing]]></category>
		<category><![CDATA[Small Business IT]]></category>
		<guid isPermaLink="false">http://www.techtastic.biz/?p=509</guid>

					<description><![CDATA[<p>There are a lot of advantages to mobility in today’s workforce, but the Bring Your Own Device (BYOD) movement has also brought its share of headaches as well. We live in a society where everyone must have the newest technology. We are inundated with ads reminding us that the smartphone or tablet we just bought&#8230;</p>
<p>The post <a href="https://www.techtastic.biz/bring-your-own-devices-byod/good-bad-mobility-bring-your-own-device/">The Good, The Bad, and the Ugly of Mobility &#038; Bring Your Own Device</a> appeared first on <a href="https://www.techtastic.biz">TechTastic</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>There are a lot of advantages to mobility in today’s workforce, but the Bring Your Own Device (BYOD) movement has also brought its share of headaches as well.</p>
<p>We live in a society where everyone must have the newest technology. We are inundated with ads reminding us that the smartphone or tablet we just bought a year ago is laughably outdated and inferior to the upgrade that just hit the market.</p>
<p>People who have just bought the latest technology don’t want to have to set it aside to use a separate company-issued device. As a result, businesses are beginning to grant these employee-owned devices access to their file and email servers, databases, and applications.</p>
<p>While this brings certain competitive advantages to employers, it naturally carries many risks, too.</p>
<p>Let’s begin with the pros of Bring Your Own Device (BYOD)…</p>
<h2>The Advantages of Bring Your Own Device (BYOD)</h2>
<p><strong>Greater Flexibility and Productivity –</strong> Personal devices allow workers more flexibility, which in turn can increase productivity. Today’s employee isn’t restricted to their office workstation or cubicle. They can carry out job responsibilities from home, a coffee shop, their child’s dance recital, or while traveling.</p>
<p><strong>Reduced Costs –</strong> Purchasing even the most basic Blackberry for an employee can cost a company $900+ per worker. Costs like that can be completely eliminated by adopting a BYOD policy where employees are required to use their own device.</p>
<p><strong>Happier Employees/Attractiveness to Job Seekers –</strong> Recent studies have found that 44% of job seekers are attracted more to employers who are open to BYOD and occasional remote work. Beyond this hiring advantage over competition, it has been found that employees as a whole are generally happier using the devices they own and prefer for work purposes.</p>
<p><strong>Better Customer Service –</strong> This goes hand and hand with more flexibility and productivity. Mobility allows employees to occasionally resolve or escalate urgent client issues outside of normal working hours, and clients remember that kind of response time.</p>
<p>And now the cons of BYOD…</p>
<h2>Disadvantages of BYOD</h2>
<p><strong>Compromised Data Security –</strong> Unfortunately, letting employees use their own smartphones, tablets, and laptops increases the likelihood of sensitive company or customer/client data being compromised. It is important for companies to establish a comprehensive mobile device security policy and never make any exceptions to it whatsoever. Really. No exceptions. Ever.</p>
<p><strong>Employee Privacy –</strong> Many employees may oppose using their own devices for work, especially if it’s a company requirement that they aren’t reimbursed for. You have to remember that these are the same devices employees use to log into their Facebook and Twitter accounts or do their online banking. In this age of constant paranoia over big brother watching our every move, employees may be concerned that their employer will spy on them or access their personal passwords and information.</p>
<p><strong>Handling Employee Turnover –</strong> Companies must consider how they will address the retrieval of company data and information from an employee’s device if the employee either quits or is fired. Some companies may require that employees only save or edit company files on their servers or use cloud-based sharing software like Dropbox to share and edit docs.</p>
<h2>The Importance of a Mobile Device Management Tool</h2>
<p>Obviously, businesses must keep track of all of the devices that access their server, applications, and data. Mobile Device Management helps enterprises centralize what is an otherwise chaotic hodgepodge of devices and operating systems. This ensures that all devices are configured, deployed, and properly monitored and managed. This is a smart way for businesses to embrace BYOD while securing data and applications across multiple devices.</p>
<p>The post <a href="https://www.techtastic.biz/bring-your-own-devices-byod/good-bad-mobility-bring-your-own-device/">The Good, The Bad, and the Ugly of Mobility &#038; Bring Your Own Device</a> appeared first on <a href="https://www.techtastic.biz">TechTastic</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://www.techtastic.biz/bring-your-own-devices-byod/good-bad-mobility-bring-your-own-device/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">509</post-id>	</item>
		<item>
		<title>3 Things to Consider Before Jumping Into BYOD</title>
		<link>https://www.techtastic.biz/bring-your-own-devices-byod/3-things-to-consider-before-jumping-into-byod/</link>
					<comments>https://www.techtastic.biz/bring-your-own-devices-byod/3-things-to-consider-before-jumping-into-byod/#_comments</comments>
		
		<dc:creator><![CDATA[Zion Finck]]></dc:creator>
		<pubDate>Fri, 29 Jun 2018 14:07:02 +0000</pubDate>
				<category><![CDATA[Bring Your Own Devices (BYOD)]]></category>
		<category><![CDATA[Small Business IT]]></category>
		<guid isPermaLink="false">http://www.techtastic.biz/?p=505</guid>

					<description><![CDATA[<p>You’ve read it time and time again. “Bring Your Own Device” isn’t a trend, it’s the future. Workplaces where companies let workers use their own devices for work purposes are the new normal. BYOD attracts new hires and lifts employee morale and productivity. But this doesn’t mean a small business owner should recklessly jump right&#8230;</p>
<p>The post <a href="https://www.techtastic.biz/bring-your-own-devices-byod/3-things-to-consider-before-jumping-into-byod/">3 Things to Consider Before Jumping Into BYOD</a> appeared first on <a href="https://www.techtastic.biz">TechTastic</a>.</p>
]]></description>
										<content:encoded><![CDATA[<div id="mainContainer" style="height: 100%; width: 100%;">
<p>You’ve read it time and time again. “Bring Your Own Device” isn’t a trend, it’s the future. Workplaces where companies let workers use their own devices for work purposes are the new normal. BYOD attracts new hires and lifts employee morale and productivity. But this doesn’t mean a small business owner should recklessly jump right into BYOD just because everyone else is doing it. Data and network security concerns have to be thought out, defined, and addressed in a comprehensive BYOD policy. Here are three things to consider.</p>
<h2>Cost of Support</h2>
<p>Most businesses salivate at the thought of the money saved by having employees participate in a BYOD program. With employees using their own devices for work, there is no need to shell out thousands of dollars for desktop PCs, smartphones, tablets, and laptops. While that’s undoubtedly a huge incentive, extra support costs must also be factored in. Chances are your employees aren’t necessarily tech savvy and will need help deploying applications and performing basic yet very necessary maintenance techniques. Unless you have a dedicated IT support team, which most SMBs do not have, you will need to turn to a Managed Service Provider (MSP) in your region for support. A MSP can provide specialized expertise and leverage Mobile Device Management (MDM) tools to keep your network infrastructure and business applications monitored, secured and fully optimized.</p>
<p>Limited Number of Support Devices</p>
<p>Obviously you can’t accommodate EVERY employee-owned device. Limiting the types of devices accepted in your BYOD program will mitigate any need to pay for software or equipment upgrades for outdated devices and keep your infrastructure safer as a whole. It’s important to not be too exclusive, select a broad range of devices and their more recent releases to accommodate the varied preferences/tastes of your employees.</p>
<h2>Legal Risks</h2>
<p>Adopting BYOD at your workplaces will expose your company to more legal risks. Sensitive business or private client/customer data can potentially be exposed if devices are lost or stolen. The personal online habits of your employees can also increase your network’s vulnerability to viruses, phishing, or hacking schemes designed to steal such data. These increased legal risks are another reason why SMBs must take precautions such as working with a MSP that offers a solid MDM solution to ensure all employee devices are configured, deployed, managed and monitored in a manner that prioritizes data integrity and security.</p>
</div>
<p>The post <a href="https://www.techtastic.biz/bring-your-own-devices-byod/3-things-to-consider-before-jumping-into-byod/">3 Things to Consider Before Jumping Into BYOD</a> appeared first on <a href="https://www.techtastic.biz">TechTastic</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://www.techtastic.biz/bring-your-own-devices-byod/3-things-to-consider-before-jumping-into-byod/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">505</post-id>	</item>
		<item>
		<title>4 Essential Pieces to Any Small Business BYOD Strategy</title>
		<link>https://www.techtastic.biz/bring-your-own-devices-byod/4-essential-pieces-to-any-small-business-byod-strategy/</link>
					<comments>https://www.techtastic.biz/bring-your-own-devices-byod/4-essential-pieces-to-any-small-business-byod-strategy/#_comments</comments>
		
		<dc:creator><![CDATA[Zion Finck]]></dc:creator>
		<pubDate>Fri, 15 Jun 2018 13:59:38 +0000</pubDate>
				<category><![CDATA[Bring Your Own Devices (BYOD)]]></category>
		<category><![CDATA[Small Business IT]]></category>
		<guid isPermaLink="false">http://www.techtastic.biz/?p=501</guid>

					<description><![CDATA[<p>Believe it or not, once upon a time, kids at the bus stop didn’t have cell phones and the mobile device strategy of many businesses was typically “you’ll take what you’re given, refrain from using it for any personal use, and the data may be scrubbed clean whenever we please.” We’ve come a long way.&#8230;</p>
<p>The post <a href="https://www.techtastic.biz/bring-your-own-devices-byod/4-essential-pieces-to-any-small-business-byod-strategy/">4 Essential Pieces to Any Small Business BYOD Strategy</a> appeared first on <a href="https://www.techtastic.biz">TechTastic</a>.</p>
]]></description>
										<content:encoded><![CDATA[<div id="mainContainer" style="height: 100%; width: 100%;">
<div>
<p>Believe it or not, once upon a time, kids at the bus stop didn’t have cell phones and the mobile device strategy of many businesses was typically “you’ll take what you’re given, refrain from using it for any personal use, and the data may be scrubbed clean whenever we please.”</p>
<p>We’ve come a long way. Today, businesses really have no choice but to let employees use personal devices for work purposes. Blurred lines now make it difficult to differentiate between what is professional and what is personal. A company or organization may partially pay for an employee’s tablet computer or smartphone, but that same device is used to upload photos to Facebook or download torrents of this season of Game of Thrones.</p>
<p>Naturally, security and privacy issues are a concern since these devices sync to the company network. Larger corporations may be able to hire IT support or produce sophisticated BYOD guidelines for employees to adhere to, but smaller businesses have limited resources.</p>
<p>In fact, recent surveys suggest that the small business sector is doing very little to preemptively prepare for potential network security risks that could arise with the use of BYOD devices. This could prove to be disastrous.</p>
<p>The practical reality is that employees are going to use their mobile devices for personal use. However, too many firms have overlooked what this means for their data security.</p>
<p>Implementing a comprehensive BYOD policy right now, rather than when it’s too late, is important. We’ve compiled a list of four items that any business currently building a BYOD strategy must consider.</p>
<ul>
<li>It must clearly be outlined what specific devices are permitted for work use.</li>
<li>The company/organization must have the ability to remotely delete company-sensitive data from mobile devices without the device owner’s permission. Remote deletion capabilities are much more refined these days; simplifying the removal of enterprise-related data from devices, while leaving other content like personal photos, contacts, apps and music downloads intact.</li>
<li>Written policies should be put into effect that correspond with terms of use policies and any guidelines pertaining to remote/telecommuting workers or the sharing of sensitive data. There should be clearly defined consequences for violating any or all policies.</li>
<li>Employee privacy should be discussed within the BYOD policy since employees often use these devices to check personal email, browse or post to Facebook and Twitter feeds, instant message, and store personal documents, photos, music and movie downloads. Employees must understand that employers still have access to the content stored on these devices. Location tracking, which gives employers the ability to locate employees, is also something to discuss since many people don’t necessarily welcome that kind of surveillance.</li>
</ul>
<p>It is understandable that BYOD and more mobile employees have some small business owners feeling anxious and nervous. But mobile management tools, periodic conversation, security checks, and research will do wonders when it comes to keeping small businesses safe.</p>
</div>
</div>
<p>The post <a href="https://www.techtastic.biz/bring-your-own-devices-byod/4-essential-pieces-to-any-small-business-byod-strategy/">4 Essential Pieces to Any Small Business BYOD Strategy</a> appeared first on <a href="https://www.techtastic.biz">TechTastic</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://www.techtastic.biz/bring-your-own-devices-byod/4-essential-pieces-to-any-small-business-byod-strategy/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">501</post-id>	</item>
	</channel>
</rss>
