Home

About Us

IT Services

Understanding IT

News & Events

Blog

Support

Contact Us

Blog
  • Register

Capstone Works Blog

Capstone Works, Inc. has been serving the Cedar Park area since 2001, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Building Your Plan for BYOD!

Building Your Plan for BYOD!

As the line between working in-office and working from home becomes more and more blurred, a new trend in employee technology has begun to emerge – BYOD, or bring your own device. Many companies are offering their employees the option to bring their own devices into the office environment as it can improve both employee satisfaction and office productivity.  But CIOs still must consider three different basic set ups/options before taking the plunge:

  1. Bring Your Own Device (BYOD) – In this set up an employee has complete control over choosing and supporting the device they use at work since it is fully owned by the employee.  This is a very popular method with smaller companies or those who utilize independent contractors.
  2. Choose Your Own Device (CYOD) – In this set up employees are offered a choice of devices that have been approved by the company for their security, reliability, and durability.  The approved devices work within the company’s IT environment, however the device itself is owned by the employee; either they have paid for it themselves or it was paid for through a company stipend and the employee can keep it for the length of their employment.
  3. Company-issued, Personally-Enabled (COPE) device – Here an employee is supplied a phone or other device, paid for by the company, that they can use for personal activities.  The employer can decide how much access and freedom employees get when using these devices.  This is the closest option to the traditional Corporate Owned Business Only (COBO) model of old.

While CYOD and COPE are often employed in larger organizations, BYOD is by far the most popular option with SMB’s.  There are many benefits to the new BYOD office set up.  When employees are totally familiar and comfortable with their own devices they are likely to be more productive since they do not require any time or training to get up to speed on optimal usage.  Additionally, personal devices, as opposed to business owned, oftentimes are the latest model with all the latest updates and features.  Early adopters love having the latest version of their preferred device and companies can leverage that desire to their advantage. 

A further advantage to adopting BYOD is cost savings to the employer.  By having people responsible for part or, in some cases, all of the cost of their mobile devices, businesses can potentially reduce the impact of mobile device costs on their bottom line.   

If and when your company adopts a BYOD policy, the best way to ensure that you do not encounter an excessive surge in calls for help to your IT team is to have strong and comprehensive BYOD guidelines in place.  Here at Capstone Works we have worked hard to research and develop guidelines for our clients to follow. Any policy should encompass seven key areas:

  1. Specify what devices are allowed.  You will be getting into the business of saying, yes iPhone, no Android, yes iPad no any other tablet. Once you have decided what devices are allowed it is key to make clear what level of support (if any) you will offer owners of these devices.
  2. Establish strict security protocols for those devices.
  3. Define a clear support policy i.e. what level of IT support will you (the employer) provide?
  4. Decide which Apps will be allowed, which will be banned.
  5. Make clear who owns the apps and data used on the employee’s devices.
  6. Be sure that your BYOD policy is aligned and fully integrated with your current Acceptable Use policy.
  7. Be sure to come up with an employee off-boarding plan.

There are many factors to consider before any manager or executive rolls out a new BYOD policy.  A successful BYOD policy can aid in productivity and employee satisfaction, a less detailed BYOD policy can lead to security breaches and numerous IT headaches.

At Capstone Works we can help you navigate through the complex new world of BYOD.  With Capstone Works’ guidance you will be able to leverage the wonderful benefits of BYOD without facing the many pitfalls.  Do not try to chart your own course through this exciting world, contact us today!

 

b2ap3_thumbnail_slideshow_beprotective.png

Ready, Set, Cloud! The time for your SMB is now.
Delta IT Disaster: The Importance of an IT Disaste...
 

Comments

No comments made yet. Be the first to submit a comment
Guest
Already Registered? Login Here
Guest
Thursday, April 18, 2024

Captcha Image

Mobile? Grab this Article!

QR-Code dieser Seite

Tag Cloud

Servers Email Quick Tips Managed Services Microsoft New Year IT Support UPS application employees download AI AWS Recovery Privacy Gadgets COVID-19 Server Cloud Computing Break/fit AutoCAD Cloud Communications cybersecurity Data Privacy Day Microsoft Office 365 Data web application phishing Social Media Content Filtering Tip of the Week Best Practices Tech Support Architect IT cybersecurity tools surge protection devices Clutch January 28 Saving Money Broadband Passwords media accounts Co-managed IT Business Continuity Remote Work Productivity Communication high-threat environment Health hackers VoIP Network Security 365 features Vendor Two-Factor Authentication Data Recovery Efficiency Cyberattack Business continuity SCAMS Delightful comprehensive IT Innovation Microsoft Teams Password HIPAA Software Technology Apple Managed Service cloud Engineering Remote Workers Business Cybersecurity best practices sports teams Small Business Disaster Recovery Malware IT support Hardware smart devices Current Events Remote Disaster Planning Ransomware Computer 2FA Users EMR Mobile Office Backup right time Outsourced IT managed IT business accounts need Workplace Strategies Security Compliance User Tips Microsoft Office Hosted Solutions employees Workplace Strategy Saving money spam business owners IoT password protection Marketing Internet Cloud services Shadow Network Passwords today IT Services Cloud computing business continuity File Folder Workplace Tips BDR Common password content Managed IT

Latest News & Events

Capstone Works is proud to announce the launch of our new website at https://www.capstoneworks.com. The goal of the new website is to make it easier for our existing clients to submit and manage support requests, and provide more information about our ser...

Contact Us

Learn more about what Capstone Works can do for your business.

Call Us Today
Call us today
(512) 882-2242

715 Discovery Blvd
Suite 511

Cedar Park, Texas 78613