Bring Your Own Device has stirred plenty of controversy. Companies are either embracing it to its fullest extent or avoiding it like the plague. BYOD can potentially save you money and help make your employees happier and more productive. But it also brings along with it a number of possible pitfalls, from security to compatibility and everything in between. For the most part, those pitfalls can be avoided with just a little planning and education. "No way," you say? Let's look at some likely worst-case scenarios and see how you can prevent them from occurring.
1: Exposed data
Exposing sensitive company data is always a fear -- BYOD or not. But employees bringing in their own devices adds an extra layer to that fear sandwich. People lose smartphones and tablets. These devices also get stolen frequently. When that happens, your data can easily fall into the wrong hands. Avoid this by adopting a secure wipe policy, so that when a device is lost or stolen, company data is removed remotely. This type of policy should be set in place immediately.
2: Passwords in the wild
Your employees could be carrying with them the keys to a number of kingdoms. These passwords can either be stored in applications (logon information) or stored on the device memory. You must have a policy in place stating that no company password is to be saved in the cache of any application on the device. Another policy should state that if employees need to retain company passwords (or even information) on their device, the information/passwords must be saved within an application that can be securely encrypted.
3: Declining productivity
What happens when your employees take advantage of the BYOD plan and spend most of their time on social networking sites, snap chatting with friends, or worse? Because many of those devices will have carrier networks, employees will most likely know they can get away with usage outside of company policy. To avoid this, establish a company policy that requires users to agree that when a device is being used within the company, it will be on the company wireless network. If those employees know they must use the wireless network, they will be less inclined to spend as much time on social networking sites -- or doing anything counterproductive.
4: Compatibility issues
With BYOD comes a deluge of possible devices and platforms. You could go to work one day and all of a sudden be looking at the prospect of supporting Android, IOS, OS X, Blackberry, Linux, Windows 8... and although the list may not seem huge, the hurdles could be. Instead of allowing any platform, you could do one of two things: Limit the platforms allowed or make it clear you will support only company-approved platforms and that for all other platform users will be on their own.
5: Bandwidth overuse
So many companies already stutter on their network. Most assume they can get by with the bare minimum -- a gross mistake. One of the beauties of BYOD is that your end users will be more prone to work outside the office (thereby using their carrier network or their own wireless); when in the office, they will be using both their desktop and their device. With the added stress on your network, you'll want to make sure you have a big enough pipe to handle the extra usage. Though most businesses are already prepared for this, some smaller businesses might be attempting to run on a standard DSL. This will not do.
6: Device management
Many are already asking the question of how to manage the devices. With various devices, on various carriers, you can't exactly set them up on a management console to better control how those machines are used. What you can do is set up a network access control (NAC) like PacketFence, and control each device via MAC address. Yes, this will require you to set up a process where end users allow you to record the MAC address of their devices. But it will go a long way toward managing those devices and how each device uses your network resources.
7: Wireless bottlenecks
With all of those extra devices coming into the company, all of them depending upon wireless networking, you are going to have to make sure your wireless is up to snuff. You won't be able to depend upon a consumer-grade wireless router. Not only will that router possibly choke on the bandwidth usage, it might not handle the level of security you need. Before you open this floodgate, purchase wireless equipment that won't bottleneck and won't open up a vast array of security holes.
8: Autonomy overuse
When you allow BYOD you are, effectively, telling your end users that you trust them enough to grant them a higher level of autonomy. This, of course, can be abused. The last thing you want is a handful of users who think they are an island and, thus, above the rule of the company. Though you are allowing BYOD, you must still make sure they understand that this does not give them free rein to break the rules and do as they please. If you have to, make employees sign a contract confirming that they understand the limits of the freedoms they've been given.
9: Virus infections
Most mobile platforms are not as susceptible to viruses as their desktop counterparts are. But that doesn't mean they can't pass along infected files. Because of this, end users need to understand they must employ an antivirus solution on any machine (or device) that passes files on to end users. Any antivirus must be approved by the company and regularly maintained and updated.
10: Compatibility complaints
You're going to face a wash of raging users complaining that the applications they have on their devices can't open files necessary for work. You'll need to make it clear that they simply have to purchase/install applications that can open company-supported file formats. One of the best office suites for this is Kingsoft Office. That will cover Microsoft Office and LibreOffice. Also make sure users have an alternative browser (like Firefox), in case their default browser is unable to handle web-based applications your company relies upon. In the end, there still may be issues they can't overcome with those devices. When that happens, there are always tools like Logmein (to gain access to their desktop) or even RDP clients.
Bring Your Own Drama
It's coming to an IT department near you. When it does, be prepared for anything and everything. You're dealing with the teen years of mobile devices and you're going to have to have tricks up your sleeve you never thought you'd need. But if you're prepared, and if you've prepared your users, that drama will hardly get the chance to rear its ugly head.
- Five BYOD security apps that will protect your data
- Four worst mistakes you can make with a BYOD policy
- BYOD's impact on the data center
- Three ways to assist clients with BYOD management
- 10 essential elements of BYOD training
- Three BYOD policies for keeping workers (and IT) happy
- Make sure BYOD doesn't mean Bring Your Own Disaster
- Alternatives to the BYOD free-for-all
For a comprehensive look at BYOD strategies, benefits, and challenges, check out the ZDNet and TechRepublic special feature BYOD and the Consumerization of IT, the TechRepublic Pro BYOD policy download, and The Executive's Guide to BYOD and the Consumerization of IT.
Jack Wallen is an award-winning writer for Techrepublic and Linux.com. As an avid promoter/user of the Linux OS, Jack tries to convert as many users to open source as possible. His current favorite flavor of Linux is Bodhi Linux (a melding of Ubuntu and Enlightenment). When Jack isn't writing about Linux he is hard at work on his other writing career -- writing about zombies, various killers, super heroes, and just about everything else he can manipulate between the folds of reality. You can find Jack's books on Amazon, Barnes & Noble, and Smashwords. Outnumbered in his house one male to two females and three humans to six felines, Jack maintains his sanity by riding his mountain bike and working on his next books. For more news about Jack Wallen, visit his website Get Jack'd.