Mastering the BYOD Balancing Act: The Softchoice Journey

Balancing Act

It’s funny how things evolve so quickly. Just a few years ago, the thought of employees using their own phones or laptops for work at work was unthinkable.

But as the consumerization of IT trend grows from a trickle to a flood, many organizations have no choice but consider how to implement a Bring Your Own Device (BYOD) program. And the experience at Softchoice was no different.

[Read more…]

Java Zero Day: Six ways to protect yourself

Java Zero Day

I am assuming you are reading this now because you saw this Security Alert for CVE-2013-4022 Released and:

  1. the panic has set in, or
  2. Oracle and Java have taken its toll or
  3. You are now getting e-mails from your executives asking if you are aware, and what you are doing about this!

Let’s quickly assess what the Internet is yelling at us about, and what the real threats are. [Read more…]

Take The Guesswork Out of Your Mobile Network

Take the guesswork out of your mobile network

Depending on your organization, BYOD means a lot of different things. BYOD can be a welcome change (employee retention, talent acquisition, employee satisfaction, productivity enhancement, lower IT costs, and potentially customer satisfaction) or a challenge (security, access/restriction of data, lost devices, etc).

Regardless, the first step is knowing the who’s, what’s and where’s of your network. The Softchoice Mobility TechCheck gives you visibility into how many devices and what kind of devices are already on your network.

With this data, companies can start to develop a plan around BYOD, such as:

  • Should companies provide freedom of choice or restrict choice to specific devices/operating systems
  • Should companies provide a stipend for the device or service
  • What does an acceptable use document look like in a BYOD world
  • What data/applications should a company allow access to …where …when …to whom

I’m holding a special mobile security webinar in December to answer your questions – read on for full details on this and our assessment.

[Read more…]

Behind the Scenes: Don’t Build A Policy From Scratch!

 

 

 

 

This is the fourth in a our series about how Softchoice is implementing BYOC. We hope you find the series interesting and look forward to your comments and thoughts on your own experiences.

Recently our team met to create our Softchoice BYOC Acceptable Use Policy that will be tied to this program. Not what you’d classify as a “fun” meeting. I’m pretty sure that there isn’t a person out there that likes writing out policies and it’s something that’s really hard to start. So hopefully this blog post can reduce the pain of your organization’s policy building meeting. Thanks to finding the right guidance from Gartner and InfoTech Research, our team was able to bang out a first draft in under an hour!

According to Gartner’s BYOC Checklist the major areas a policy needs to cover are:

[Read more…]

Surviving BYOA: Our Top 3 Apps for Work

While BYOD (bring-your-own-device) seems to be a major concern of IT administrators today, BYOA – or bring-your-own-application – is becoming increasingly as significant. Using third-party applications and cloud services in the workplace brings about a host of control, security and productivity considerations. And just like BYOD, BYOA is real. According to a recent Fortinet study of over 3,800 active employees in their twenties, 69 percent indicated that they were interested in creating and using their own applications, while 30 percent admitted they would likely contravene any restrictive company policies.

In this next BYOD Behind the Scenes expedition, I took a look at industry trends and conducted a poll of Softchoice employees to compile our top 3 applications to bring to work! Share this list to with your users and ensure they’re getting the most out of their chosen devices and can make the safest, most productive decisions for your company.

[Read more…]

Infographic: The Path to Better BYOD

Our latest infographic examines the differences between the user experience and the IT experience when implementing a BYOD strategy. From user demands for anywhere access to network security, and quick application loading times to a virtual desktop infrastructures, this infographic aims to help you ensure your back-end can support the new demands BYOD places on your IT environment.

No time to browse? Click ‘More’ to read the top 4 considerations.

[Read more…]