Home

About Us

IT Services

Understanding IT

News & Events

Blog

Support

Contact Us

Blog
  • Register

Capstone Works Blog

Capstone Works, Inc. has been serving the Cedar Park area since 2001, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Building Your Plan for BYOD!

Building Your Plan for BYOD!

As the line between working in-office and working from home becomes more and more blurred, a new trend in employee technology has begun to emerge – BYOD, or bring your own device. Many companies are offering their employees the option to bring their own devices into the office environment as it can improve both employee satisfaction and office productivity.  But CIOs still must consider three different basic set ups/options before taking the plunge:

  1. Bring Your Own Device (BYOD) – In this set up an employee has complete control over choosing and supporting the device they use at work since it is fully owned by the employee.  This is a very popular method with smaller companies or those who utilize independent contractors.
  2. Choose Your Own Device (CYOD) – In this set up employees are offered a choice of devices that have been approved by the company for their security, reliability, and durability.  The approved devices work within the company’s IT environment, however the device itself is owned by the employee; either they have paid for it themselves or it was paid for through a company stipend and the employee can keep it for the length of their employment.
  3. Company-issued, Personally-Enabled (COPE) device – Here an employee is supplied a phone or other device, paid for by the company, that they can use for personal activities.  The employer can decide how much access and freedom employees get when using these devices.  This is the closest option to the traditional Corporate Owned Business Only (COBO) model of old.

While CYOD and COPE are often employed in larger organizations, BYOD is by far the most popular option with SMB’s.  There are many benefits to the new BYOD office set up.  When employees are totally familiar and comfortable with their own devices they are likely to be more productive since they do not require any time or training to get up to speed on optimal usage.  Additionally, personal devices, as opposed to business owned, oftentimes are the latest model with all the latest updates and features.  Early adopters love having the latest version of their preferred device and companies can leverage that desire to their advantage. 

A further advantage to adopting BYOD is cost savings to the employer.  By having people responsible for part or, in some cases, all of the cost of their mobile devices, businesses can potentially reduce the impact of mobile device costs on their bottom line.   

If and when your company adopts a BYOD policy, the best way to ensure that you do not encounter an excessive surge in calls for help to your IT team is to have strong and comprehensive BYOD guidelines in place.  Here at Capstone Works we have worked hard to research and develop guidelines for our clients to follow. Any policy should encompass seven key areas:

  1. Specify what devices are allowed.  You will be getting into the business of saying, yes iPhone, no Android, yes iPad no any other tablet. Once you have decided what devices are allowed it is key to make clear what level of support (if any) you will offer owners of these devices.
  2. Establish strict security protocols for those devices.
  3. Define a clear support policy i.e. what level of IT support will you (the employer) provide?
  4. Decide which Apps will be allowed, which will be banned.
  5. Make clear who owns the apps and data used on the employee’s devices.
  6. Be sure that your BYOD policy is aligned and fully integrated with your current Acceptable Use policy.
  7. Be sure to come up with an employee off-boarding plan.

There are many factors to consider before any manager or executive rolls out a new BYOD policy.  A successful BYOD policy can aid in productivity and employee satisfaction, a less detailed BYOD policy can lead to security breaches and numerous IT headaches.

At Capstone Works we can help you navigate through the complex new world of BYOD.  With Capstone Works’ guidance you will be able to leverage the wonderful benefits of BYOD without facing the many pitfalls.  Do not try to chart your own course through this exciting world, contact us today!

 

b2ap3_thumbnail_slideshow_beprotective.png

Ready, Set, Cloud! The time for your SMB is now.
Delta IT Disaster: The Importance of an IT Disaste...
 

Comments

No comments made yet. Be the first to submit a comment
Guest
Already Registered? Login Here
Guest
Monday, April 29, 2024

Captcha Image

Mobile? Grab this Article!

QR-Code dieser Seite

Tag Cloud

Data Privacy Day smart devices Backup Small Business Innovation Mobile Office Social Media HIPAA Cloud Computing business AWS Current Events Internet Hardware Cyberattack cybersecurity tools Privacy Managed IT Cloud services Tip of the Week media accounts Computer Delightful Break/fit web application accounts need Hosted Solutions business owners Communication devices Microsoft Office right time sports teams EMR Microsoft Teams Users Managed Services AutoCAD Architect IT Efficiency UPS Email Network Security BDR Recovery Gadgets Outsourced IT File Folder Remote Work Ransomware Data COVID-19 Passwords today Cloud Communications VoIP managed IT Servers Business Continuity Software Data Recovery IT Support Apple application employees download spam Health Saving Money IT Services User Tips Disaster Planning employees New Year Remote Workers Common password content best practices Workplace Tips Disaster Recovery hackers comprehensive IT Security cloud 365 features high-threat environment Two-Factor Authentication Managed Service Network Remote January 28 Shadow Compliance Quick Tips Best Practices Co-managed IT business continuity AI IoT Saving money Broadband Password Content Filtering 2FA SCAMS Business continuity surge protection Microsoft Technology password protection Workplace Strategy Productivity Engineering cybersecurity Workplace Strategies Clutch Server Passwords Tech Support Marketing Business Cybersecurity Microsoft Office 365 IT support Vendor Cloud computing Malware phishing

Latest News & Events

Capstone Works is proud to announce the launch of our new website at https://www.capstoneworks.com. The goal of the new website is to make it easier for our existing clients to submit and manage support requests, and provide more information about our ser...

Contact Us

Learn more about what Capstone Works can do for your business.

Call Us Today
Call us today
(512) 882-2242

715 Discovery Blvd
Suite 511

Cedar Park, Texas 78613