BYOD series: How do we implement BYOD Steps 3 and 4


My last blog stated that implementing any strategy follows four simple steps and it covered the first two steps.

1)      Where are we now?
2)      Where do we want to be?
3)      How will we get there?
4)      How will we know we have arrived?

They were the easy parts!  Now you have an idea about where you want to be, the real planning begins. Your IT team now has a great idea of the current and preferred situation and are able to tackle the issues surrounding the implementation of BYOD.  It has sounded pretty simple so far but it is important to realise there are some big decision to make around implementing BYOD.

3)      How will we get there?

I do not profess to hold all of the answers for every organisation.  I hope nobody does!  Your team will need to work with your business objectives, budgets, culture and answers to step 1 and 2.  Some of the Mobile Device Management (MDM) issues you will need to consider include:

Device security – device wipe and lockdown, password management, configuration

Threat management – anti malware, anti spyware, anti spam, firewall, web filtering, web reputation (as well as internal threats)

Information protection – data encryption (device, file and app), mobile data loss prevention

Network protection – secure communications (VPN), edge protection

Identity and access management – identity management (device and people), authorise and authenticate, certificate management, multi factor authentication

Your IT team will have a good idea regarding other considerations.

Paint a picture of the steps you will need to undertake to implement a secure BYOD strategy.

  • What technology issues need to be considered to support your BYOD vision and keep your data secure?
  • How will you regularly monitor risk?
  • What policies are required to support that vision
  • How will you communicate those policies?
  • How do you need to prepare your help desk to support BYOD?

You will be able to implement a successful BYOD strategy if you have a well researched, understood and agreed plan, with clear time and cost implications.

4)      How will we know we have arrived?

This step is always pretty simple if you have laid out a clear plan as to where you want to be (step 2).  If you know where you want to be it is easy to check if you have arrived, determine what went well in the journey and see how things could be improved in the future.  You will be able to measure aspects such as security and risk issues, help desk stats, BYOD user satisfaction and importantly, increases in productivity (assuming this is one of your objectives).

As technology and the devices people use are regularly changing it is likely that you will soon find yourself wanting to improve your BYOD strategy.  It would be useful to create a BYOD user group to regularly meet and discuss issues with the IT team.  Communication is paramount in implementing policies and the more communication channels open to users the better.  Creating self help areas for support and communities to assist one another in your BYOD journey will prove useful.

Paint a picture of what has gone well with your BYOD strategy implementation and measure against the objectives you set.

You will be able to continue improving your BYOD strategy if you take time out to measure success.

The final blog in this series will be “communicating your BYOD strategy”.

Other blogs in this BYOD series:

What is BYOD?

Why implement BYOD?

How to implement BYOD – steps 1 and 2

Susie May

Advertisements

One thought on “BYOD series: How do we implement BYOD Steps 3 and 4

  1. Pingback: BYOD series: Successful BYOD strategy involves successful communication « The CowShed

Your turn!

Please log in using one of these methods to post your comment:

WordPress.com Logo

You are commenting using your WordPress.com account. Log Out / Change )

Twitter picture

You are commenting using your Twitter account. Log Out / Change )

Facebook photo

You are commenting using your Facebook account. Log Out / Change )

Google+ photo

You are commenting using your Google+ account. Log Out / Change )

Connecting to %s