Release Management Authors: Liz McMillan, Jnan Dash, Lori MacVittie, Gilad Parann-Nissany, Carmen Gonzalez

Related Topics: Microservices Expo, Mobile IoT, Agile Computing, Release Management , Cloud Security

Microservices Expo: Blog Feed Post

BYOD Policy for SMB

What things should you address?

In today’s economy, many businesses are looking at employees using their own mobile devices at work as a way to cut expenses.

One reason for the growing BYOD (Bring Your Own Device) trend is because many companies can’t afford to keep up with the latest updates in mobile technologies.  The devices employees own are frequently more advanced than what is available at work.  And they have taken the time to personalize the functionality of devices in a way that works best for them.  It’s no wonder that they want to use them at work.  They have become a part of who they are.

BYOD offers many benefits, but there are also many challenges and companies have to be prepared on how to handle them.   Despite the fact that most of the literature about developing BYOD policies is geared towards large corporations and enterprises, that doesn’t mean that small and mid sized businesses don’t need to have policies in place too, especially if you are giving your employees access to the company network and/or sensitive data.

Bigger companies tend to have large IT departments, so they are already “geared” up for dealing with many of the issues associated with employees using their own devices at work, and there is a lot that SMB’s can learn from them.

Who Pays for What?
It is easy to separate personal and business calls by looking at the monthly billing statement, but when it comes to data usage, it is not so easy.  We all want to trust our employees, but it is not always to tell whether data usage during business hours is for downloading work documents or for the latest Angry Birds update.

Suggestion – if an employee wants to use his personal device for work, ask to see a data usage history for the previous six months or so.  This will give you a baseline.  If you have employees who are using company mobile devices for similar job role, you can also use this as a baseline.   Establish monthly reimbursement of fees in advance so there is no confusion later.

Damage to Devices during Work
What happens if an employee’s mobile device is damaged during the course of a work related activity?  Will you be responsible for replacement?  And if you are, what happens if the employee’s device was “more advanced” than what was needed for the job and the replacement value is well over the cost of what it would have been if he were using a company device?

Considering the fact that most vendors offer volume discounts when they buy multiple phones for their employees, this is a very likely scenario that you will need to be prepared to handle.   Set a cap in advance for reimbursement and have the employee sign off on it, stating that he has made decision to use his own phone at work and accepts responsibility for additional costs.

Whatever you decide works best for you, make sure you address the issues of cost sharing and reimbursement before a problem arises. Your BYOD policy should explain exactly what charges the organization will and won’t reimburse.

Data Storage
There are several things to consider with regards to data storage, the first of which is making sure that there is a system in place for employees to keep business and personal data, documents and information stored separately on their phones.  Many models allow users to create completely separate profiles.  Talk to employees about how you want to handle this and have a plan to monitor it from time to time.

In addition to separate storage locations, you also need to have a plan in place for automatic back-up and storage of data outside of the actual device.   There are many Cloud-Based applications and data storage services to choose from.

Make sure that you have a plan for how you will handle what you will do in the event that a device that contains sensitive data is lost or stolen.  Will you wipe the entire device? Or just the “business” part?  What happens if there is cross-over?  Discuss this with your employees before it happens.

Technical Support
When your employees are using company mobile devices, you are responsible for providing in house support through your own IT department or through your chosen service provider.   Both of these scenarios give you control of making sure that troubleshooting and problem solving are handled quickly and efficiently.

How will you handle the issue of technical support if you allow employees to BYOD?  What happens if there is a problem with an employee’s phone that affects his ability to perform his duties?  Have a plan in advance before work time is lost.

Security Issues
Addressing the security issues of allowing your employees to have access to your company network with their mobile devices goes well beyond the scope of this article, but it is critical that you deal with this ahead of time.   Most people do not password-protect their devices and do not do their due diligence when they download applications.

If you do not have an in-house IT team, hire a consultant who specializes in mobile technologies to help you understand the potential security risks you face with BYOD and how you can minimize them.

As the expression goes, being forewarned is being forearmed.

For more information, you may want to check out the Bring-Your-Own-Device (BYOD) Toolkit, which was recently released by the U.S. Chief Information Officer and the Federal CIO Council.  It provides guidelines, case studies and sample polices that you can adapt to your business.

Read the original blog entry...

More Stories By Hovhannes Avoyan

Hovhannes Avoyan is the CEO of PicsArt, Inc.,

@ThingsExpo Stories
In his general session at 18th Cloud Expo, Lee Atchison, Principal Cloud Architect and Advocate at New Relic, discussed cloud as a ‘better data center’ and how it adds new capacity (faster) and improves application availability (redundancy). The cloud is a ‘Dynamic Tool for Dynamic Apps’ and resource allocation is an integral part of your application architecture, so use only the resources you need and allocate /de-allocate resources on the fly.
SYS-CON Events announced today that 910Telecom will exhibit at the 19th International Cloud Expo, which will take place on November 1–3, 2016, at the Santa Clara Convention Center in Santa Clara, CA. Housed in the classic Denver Gas & Electric Building, 910 15th St., 910Telecom is a carrier-neutral telecom hotel located in the heart of Denver. Adjacent to CenturyLink, AT&T, and Denver Main, 910Telecom offers connectivity to all major carriers, Internet service providers, Internet backbones and ...
In the next five to ten years, millions, if not billions of things will become smarter. This smartness goes beyond connected things in our homes like the fridge, thermostat and fancy lighting, and into heavily regulated industries including aerospace, pharmaceutical/medical devices and energy. “Smartness” will embed itself within individual products that are part of our daily lives. We will engage with smart products - learning from them, informing them, and communicating with them. Smart produc...
More and more brands have jumped on the IoT bandwagon. We have an excess of wearables – activity trackers, smartwatches, smart glasses and sneakers, and more that track seemingly endless datapoints. However, most consumers have no idea what “IoT” means. Creating more wearables that track data shouldn't be the aim of brands; delivering meaningful, tangible relevance to their users should be. We're in a period in which the IoT pendulum is still swinging. Initially, it swung toward "smart for smar...
In his keynote at 19th Cloud Expo, Sheng Liang, co-founder and CEO of Rancher Labs, will discuss the technological advances and new business opportunities created by the rapid adoption of containers. With the success of Amazon Web Services (AWS) and various open source technologies used to build private clouds, cloud computing has become an essential component of IT strategy. However, users continue to face challenges in implementing clouds, as older technologies evolve and newer ones like Docke...
WebRTC sits at the intersection between VoIP and the Web. As such, it poses some interesting challenges for those developing services on top of it, but also for those who need to test and monitor these services. In his session at WebRTC Summit, Tsahi Levent-Levi, co-founder of testRTC, reviewed the various challenges posed by WebRTC when it comes to testing and monitoring and on ways to overcome them.
In his keynote at 18th Cloud Expo, Andrew Keys, Co-Founder of ConsenSys Enterprise, provided an overview of the evolution of the Internet and the Database and the future of their combination – the Blockchain. Andrew Keys is Co-Founder of ConsenSys Enterprise. He comes to ConsenSys Enterprise with capital markets, technology and entrepreneurial experience. Previously, he worked for UBS investment bank in equities analysis. Later, he was responsible for the creation and distribution of life sett...
SYS-CON Events announced today that Coalfire will exhibit at the 19th International Cloud Expo, which will take place on November 1–3, 2016, at the Santa Clara Convention Center in Santa Clara, CA. Coalfire is the trusted leader in cybersecurity risk management and compliance services. Coalfire integrates advisory and technical assessments and recommendations to the corporate directors, executives, boards, and IT organizations for global brands and organizations in the technology, cloud, health...
@ThingsExpo has been named the Top 5 Most Influential M2M Brand by Onalytica in the ‘Machine to Machine: Top 100 Influencers and Brands.' Onalytica analyzed the online debate on M2M by looking at over 85,000 tweets to provide the most influential individuals and brands that drive the discussion. According to Onalytica the "analysis showed a very engaged community with a lot of interactive tweets. The M2M discussion seems to be more fragmented and driven by some of the major brands present in the...
The Internet of Things (IoT), in all its myriad manifestations, has great potential. Much of that potential comes from the evolving data management and analytic (DMA) technologies and processes that allow us to gain insight from all of the IoT data that can be generated and gathered. This potential may never be met as those data sets are tied to specific industry verticals and single markets, with no clear way to use IoT data and sensor analytics to fulfill the hype being given the IoT today.
SYS-CON Events announced today that Transparent Cloud Computing (T-Cloud) Consortium will exhibit at the 19th International Cloud Expo®, which will take place on November 1–3, 2016, at the Santa Clara Convention Center in Santa Clara, CA. The Transparent Cloud Computing Consortium (T-Cloud Consortium) will conduct research activities into changes in the computing model as a result of collaboration between "device" and "cloud" and the creation of new value and markets through organic data proces...
SYS-CON Events announced today that MathFreeOn will exhibit at the 19th International Cloud Expo, which will take place on November 1–3, 2016, at the Santa Clara Convention Center in Santa Clara, CA. MathFreeOn is Software as a Service (SaaS) used in Engineering and Math education. Write scripts and solve math problems online. MathFreeOn provides online courses for beginners or amateurs who have difficulties in writing scripts. In accordance with various mathematical topics, there are more tha...
@ThingsExpo has been named the Top 5 Most Influential Internet of Things Brand by Onalytica in the ‘The Internet of Things Landscape 2015: Top 100 Individuals and Brands.' Onalytica analyzed Twitter conversations around the #IoT debate to uncover the most influential brands and individuals driving the conversation. Onalytica captured data from 56,224 users. The PageRank based methodology they use to extract influencers on a particular topic (tweets mentioning #InternetofThings or #IoT in this ...
SYS-CON Events announced today that SoftNet Solutions will exhibit at the 19th International Cloud Expo, which will take place on November 1–3, 2016, at the Santa Clara Convention Center in Santa Clara, CA. SoftNet Solutions specializes in Enterprise Solutions for Hadoop and Big Data. It offers customers the most open, robust, and value-conscious portfolio of solutions, services, and tools for the shortest route to success with Big Data. The unique differentiator is the ability to architect and ...
SYS-CON Events announced today that Niagara Networks will exhibit at the 19th International Cloud Expo, which will take place on November 1–3, 2016, at the Santa Clara Convention Center in Santa Clara, CA. Niagara Networks offers the highest port-density systems, and the most complete Next-Generation Network Visibility systems including Network Packet Brokers, Bypass Switches, and Network TAPs.
SYS-CON Events announced today that Embotics, the cloud automation company, will exhibit at the 19th International Cloud Expo, which will take place on November 1–3, 2016, at the Santa Clara Convention Center in Santa Clara, CA. Embotics is the cloud automation company for IT organizations and service providers that need to improve provisioning or enable self-service capabilities. With a relentless focus on delivering a premier user experience and unmatched customer support, Embotics is the fas...
In an era of historic innovation fueled by unprecedented access to data and technology, the low cost and risk of entering new markets has leveled the playing field for business. Today, any ambitious innovator can easily introduce a new application or product that can reinvent business models and transform the client experience. In their Day 2 Keynote at 19th Cloud Expo, Mercer Rowe, IBM Vice President of Strategic Alliances, and Raejeanne Skillern, Intel Vice President of Data Center Group and ...
Virgil consists of an open-source encryption library, which implements Cryptographic Message Syntax (CMS) and Elliptic Curve Integrated Encryption Scheme (ECIES) (including RSA schema), a Key Management API, and a cloud-based Key Management Service (Virgil Keys). The Virgil Keys Service consists of a public key service and a private key escrow service. 

Data is the fuel that drives the machine learning algorithmic engines and ultimately provides the business value. In his session at Cloud Expo, Ed Featherston, a director and senior enterprise architect at Collaborative Consulting, will discuss the key considerations around quality, volume, timeliness, and pedigree that must be dealt with in order to properly fuel that engine.
Fifty billion connected devices and still no winning protocols standards. HTTP, WebSockets, MQTT, and CoAP seem to be leading in the IoT protocol race at the moment but many more protocols are getting introduced on a regular basis. Each protocol has its pros and cons depending on the nature of the communications. Does there really need to be only one protocol to rule them all? Of course not. In his session at @ThingsExpo, Chris Matthieu, co-founder and CTO of Octoblu, walk you through how Oct...