Bring your own device (BYOD)

How Microsoft Intune Can Benefit Your Business

How Microsoft Intune Can Benefit Your Business 600 329 Greenlight Managed IT Support Services | Sydney | Melbourne

The use of mobile devices is becoming standard in business. Smartphones and tablets have taken their place as tools your employees want to use. Whether for communication or collaboration, expect people to have mobile devices at hand. To make this work, your business needs mobile device management, that’s where Microsoft Intune can help.

More work is getting done in the cloud, especially with more people working remotely. Employees want to be able to access the same applications and data they’d get on a desktop or laptop, right there on the device in their hands, wherever they may be.

This presents a security challenge. When all devices connecting to a work environment are on-site, it’s easier to control the connections. The business could put “Bring Your Own Device” (BYOD) policies in place to control:

  • what devices employees use to connect;
  • how much access they have when connecting;
  • what applications they can use on devices connected to the business network.

And, most important of all:

  • the ability to remove company owned data should the employee leave.

Still, mobile device management software can benefit your business. You’ll be able to reduce IT workload, improve experience, enable greater efficiency, and reduce risk.

Cloud-based Mobile Device Management with Intune

Microsoft Intune offers cloud-based mobile device management (MDM). This enterprise security offering combines MDM and mobile application management (MAM).

In a use case, Accenture used Intune’s MDM to enforce mobile device encryption and use of a PIN. MAM helped secure the Microsoft Office suite, without having to control employee devices.

Intune allows users to access critical business data and applications on any mobile device. Intune provides a unified way to securely manage Android, iOS, Windows, and macOS devices.

Further, Intune streamlines and automates deployment, provisioning, policy management, app delivery, and updates. Plus, the globally distributed cloud service architecture is highly scalable.

This helps your IT team support the diverse mobile ecosystem more efficiently. There’s no need to set up each device individually, as the software deploys across all devices at once. IT can track licenses, rollout updates, and get hardware configuration and software installation information, all in one place and without having to buy any added infrastructure. Meanwhile, employees can move between mobile devices and desktops without jeopardizing company security.

Your business might ask employees to enroll any devices they use to access Office 365 data, yet there may still be devices you don’t know about or that your partners are using to access your important data. Intune provides you with precise control. You can specify what data different users can access. You can also say what they can do with the data within Office and other mobile apps.

Boosting Cybersecurity Protection with Intune

Intune’s integration with Azure directory also allows the business to enforce access policies. You might limit access based on user, location, device state, or app sensitivity. Powerful AI and machine learning also helps to proactively protect the business environment. Integrating Intune and Microsoft Defender helps prevent and limit the impact of a security breach.

Your business can review and establish security policy and configuration setting baselines. It’s also easier to meet legal and company cybersecurity requirements. Data protection, encryption, and anti-malware are all done in the admin console.

At the same time, you avoid intruding on users’ personal devices. Contextual controls can distinguish between business and personal use of apps.

Improve cybersecurity resilience and support employee productivity on mobile devices. Intune allows you to track devices, manage policies, ensure updates, and protect data, all from one location.

Intune is included in certain Enterprise Mobility and Security subscriptions. Contact us today to learn more about this solution. Learn how it suits your mobile device management and mobile access management needs.

Bring your own device (BYOD)

BYOD: How to Increase Productivity without Compromising Security

BYOD: How to Increase Productivity without Compromising Security 1000 667 Greenlight Managed IT Support Services | Sydney | Melbourne

Using personal devices for business tasks is convenient but poses several security risks. Sadly, many are not aware of the safety issues of Bring Your Own Device (BYOD) practices. Not everyone will pay attention to the way they access their company’s data through their smartphones or tablets. They won’t even think twice about connecting to a public Wi-Fi connection because their focus is getting work done. Let’s face it: Productivity trumps security for most users.

BYOD is something that gives network and security administrators headaches, both in house and offering managed IT services. It’s easy to lose important data when someone uses a personal device for work-related tasks without proper precautions. This opens the door for security breaches and other problems where disaster recovery. The question now is: Is it possible to improve productivity without compromising security when using personal devices for work?

The answer depends on how strong your drive is to improving both because, let’s face it, there will always be risks of losing data even if you workers are using company-owned computers. It all boils down on the user and how solid your company’s BYOD strategies are.

Implementing Clearly Defined Policies

Companies first need to create clear policies regarding usage of personal devices for work-related tasks. These must include why, when, and how they can access data. You need to draw the lines and make it clear to employees the risks involved in using their own devices. Conducting trainings and regular meetings about data security can be advantageous.

Don’t forget to get them involved. Most of the time, your employees don’t know their activities are compromising security because they have no idea. By educating your staff, you significantly reduce the risks.

You may think that only huge companies can pull this off because they have departments that can take care of trainings. They’re not the only ones. Although it might present some challenges, small business can also implement BYOD security strategies.

Encourage Responsible Data and Device Use

If users are well-informed of the risks involved, they’re more likely to become more responsible in using their devices. It’s up to you, as their boss, to lead by example. Be transparent. Demonstrate how you use your own devices for work, when possible. Encourage discussions and friendly exchanges between all concerned parties so that you can address any concern, like confusion about apps that they can or cannot download.

More importantly, give them the impression that you’re willing to assist if they encounter any problem. A recent Gartner study found that only 27 percent of users in the US that found security issues with their devices felt the need to report to their employers. You don’t want your staff to withhold critical information like this. You have to stay on top of any security concern and that will only happen if they’re comfortable enough to talk to you.

Consider Investing on the Appropriate Technology

Using the right technology is very important in securing your data. Even the most prudent employee can lose critical information if he doesn’t have the right tools. The most obvious route is to install antivirus and anti-malware software in all devices. In this day and age surveillance is getting a pad reputation, but monitoring the devices’ location and Internet traffic is a crucial aspect of preventing any security breach. That way, you can take appropriate actions when, say, an employee loses a tablet or smartphone. Monitoring software will let you either retrieve the device or, in the event it was stolen, help the authorities apprehend the culprit.

Kill Switch, Anyone?

These days, it’s increasingly easy to retrieve data from lost or stolen phones. This can be disastrous for companies. That’s why a kill switch might be the best solution. It’s basically a device that can remotely wipe or shut down any device and render the hardware unusable.

But there’s the question of what happens to the user’s personal information? Jeff Rubin, Vice President of Strategy at a security specialist company, raises this issue. The company’s option would be to contain the data on the user’s device so the kill switch can only wipe out applications that contain corporate data, leaving their personal files intact.

Another solution would be to use software that allows you to approve the applications installed in smartphones, tablets, and even laptops. Gartner predicted that the number of people who use mobile applications will double by 2015, and this makes software like this more appealing to business owners.

Dual Persona Smart Phones

Samsung and Blackberry have recently rolled out their own versions of security and management software that has dual-personality features, which enables users to separate personal and corporate data on devices like the Z10 and Galaxy S4.

What Should You Do?

BYOD is here to stay. In fact, companies across the globe are working towards improving the productivity, flexibility, and efficiency of their employees. So much, actually, that they will soon make it mandatory for employees to use their own devices. And with the increase of smartphone and tablet sales to consumers, you can only expect more people to use these in lieu of their office PCs. As such, it’s crucial that companies work hard in implementing solid strategies that improve productivity without compromising security, even if they use managed IT services and refer these matters to contractors for the most part.

A combination of the right tools and solid BYOD policies should be enough to get everyone on board, making them more responsible in using personal devices for work.