A recent Texas case holds several simple but important lessons for implementing BYOD (mobile) policies for employers and employees alike. In Rajaee v Design Tech Homes et al., (Dist. Court, SD Texas, 2014), Saman Rajaee sued his employer, Design Tech Homes, for remote wiping personal data from his iPhone shortly after Rajaee gave notice of resignation. Rajaee cited violations of both federal and state law. Although the case was dismissed in federal court, the state court claims are still pending.Read More
It’s hardly news to CIOs and other IT professionals that smartphones are an integral part of everyday life for most working adults. But it was still a bit of a shock when Yahoo CEO Marissa Mayer stood up at the 2014 World Economic Forum in Davos to cite research that the average person now checks their smartphone a staggering 150 times a day.
Shortly thereafter, Salesforce CEO Marc Benioff showed the FitBit device he said had helped him lose 30 pounds, and noted that “I lost 30 pounds wearing the Fitbit; I do 10,000 steps a day. But here’s the amazing thing: Last week I got a call from Michael Dell. He asked if I’m feeling okay. ‘Why?’ I asked him. ‘I’m worried about you,’ he said, ‘because I’m your friend on the Fitbit network and noticed you hadn’t worked out in the last 3 days and wanted to make sure you’re okay,’ said Benioff.Read More
According to the Darkreading security blog, 2014 was a year when IT got BYOD wrong. In an article based on the results from a Bitdefender survey Darkreading said the numbers prove that we’re doing BYOD wrong.Read More
In a recent guest post on the Business2Community website, Absolute Software VP Stephen Midgley wrote that while mobile devices have created a productive work environment where nearly everything is instant, collaborative and shareable, employees are also putting valuable company data at risk by “getting up to mischief.”Read More
Everyone in IT knows about BYOD – bring your own (mobile) device. But does your company have a policy and procedure in place to deal with BYOA? Employee use of third-party cloud application services and consumer applications in the workplace is one of the biggest challenges facing IT right now.
According to a recent report from Gartner, this is trend represents such a challenge because more than 75% of mobile apps fail basic security tests. Employees download from app stores and use mobile apps that can access enterprise assets or perform business functions, and many of these apps have little or no security assurances. Well-meaning employees can easily expose themselves to cyberattacks and violations of enterprise security policies.Read More
IDC says that 1.2 billion workers were using mobile devices at the end of 2013. If there was a battle about whether or not mobile devices were welcome in the workplace, the war is over and users won. In fact, IDC says that the adoption of mobile technology is moving at unprecedented speeds, putting the needs and experience of end users at the forefront of any company's mobile enterprise strategy.Read More
Are employees more productive using their own smartphone or tablet as part of a BYOD program? That’s long been a tricky question for CIOs, but CIO.com staff writer Tom Kaneshige answered the question in an article published over the weekend.
Quoting from a survey by BMC Software, Kaneshige says that the average BYOD-carrying employee works an extra two hours and sends 20 more emails every day. One out of three BYOD employees checks work email before the official start of their work day, between 6 a.m. and 7 a.m. Three out of four IT managers claim, "BYOD is a big productivity boost."Read More
Is your EMM solution complete? It’s not a question most IT managers really think much about. After all, enterprise mobility management (EMM) is defined as an all-encompassing approach to securing and enabling business workers' use of smartphones and tablets.
A strong EMM strategy will also help mobile end users work more productively by providing them new tools to do their jobs on smartphones and tablets. Enterprise app stores or other application delivery and deployment technologies are common components of EMM, as are identity management systems to control user access to these new tools.Read More
Football – not the American-style game played with a pointed ball by men in helmets and pads, but the global game played with a round ball by men in shorts -- is suddenly a hot topic in U.S. IT circles.
(Last week, we published the first part of a two-part look at how pre-surveys and user audits help IT departments create a framework that will keep a BYOD policy from devolving into a chaotic, unsecured “do your own thing” (DYOT) environment. This is the second part of that article.)