BYOD: Intensive Setup Ensures a Successful Implementation

shutterstock_292636697The debate today isn’t whether or not to implement a bring your own device (BYOD) program — it’s how to best go about making the transition to BYOD as smooth as possible. Many businesses have learned that a BYOD program improves productivity and reduces costs. A 2014 survey by research firm Tech Pro found that 74% of businesses surveyed either had an existing BYOD program or were planning to create one.

Despite the popularity of BYOD programs, moving from work devices to employee-owned devices is not an instant switch. Businesses need to be mindful of the fact that planning and maintaining will be required until the transition is complete. There are four major steps that a business can follow to make this transition as smooth as possible.

1) Have a Clear Goal

A business with a clear vision for its BYOD program will be able to implement it smoothly and efficiently. Some benefits of determining a goal in advance include:

  • easier management,
  • higher productivity, and
  • happier employees.

With a clear end goal, everyone involved in the BYOD implementation process will know what they are trying to achieve and why.

2) Communicate with IT

Good communication with the IT department is key to successfully implementing a BYOD program. Businesses should answer two key questions before beginning the BYOD program:

  • What devices are supported?
  • Of those devices, what will the business allow to be used?

An employee could potentially use their cell phone, tablet, and/or laptop or other personal computer in a BYOD program. Businesses should know which devices their IT department can best handle. For more uniformity of devices used, businesses could also look into partnering with a vendor that will allow employees to buy devices at a discount. This will make for easier management and streamline any repair or troubleshooting processes.

3) Carefully Create the BYOD Policy

There are many factors to consider when creating a BYOD policy, including:

  • Participants in the program
  • Eligible devices
  • Levels of employee access to business data
  • Security considerations
  • Whether or not to install a monitoring program
  • What to do if a device is lost or damaged
  • How much control the business will have over installed and banned apps
  • The exit process for an employee who is leaving the business

4) Train Employees

Once setup is complete, it’s important to ensure that all employees who are a part of the program have been properly trained. Communication is again key here; a meeting should be scheduled in person and employees should be aware of the policy regarding BYOD. Initial training will likely take time and resources, but once training is complete and the program is in place, future updates should be quick and efficient.

A BYOD program may seem like a lot of work, but it will soon lead to increased productivity and decreased costs. By being prepared beforehand, a business can ensure that the transition is as smooth and streamlined as possible.

Five Common Wi-Fi Attacks and How to Prevent or Fix Them

shutterstock_130687829Any business with an online presence, or that uses Wi-Fi within their organization, needs to be aware of attacks. Fortunately, while there are some sophisticated attacks that any business can fall victim to, there are also a number that can be easily fixed or defended against. The five most common attacks, and methods of intrusions, are:

  • Denial of Service (DoS) attacks
  • Guests on your network
  • Lost devices
  • Rogue access points
  • Session hijacking

DoS Attacks

Most people who use the internet have heard of DoS, or Denial of Service, attacks. Because access points use vulnerable radio waves, a successful DoS attack can easily cause a business’ Wi-Fi network to become slow and inconsistent, or even go down completely. The best defense for an attack such as this is to use an Intrusion Prevention System (IPS) tool, which will monitor the network to detect and defend against incoming attacks.

There is also a more innocent version of a DoS attack that usually isn’t initiated by a hacker: wireless signal overlap with a nearby network. This can easily be fixed by checking, then adjusting Wi-Fi-enabled equipment to reduce or eliminate signal conflicts.

Network Guests

Authorized users can sometimes be the source of network insecurity. Businesses may not always know which users are accessing information. There is a solution however a security protocol known as WPA2, or Wi-Fi Protected Access II. Using the Pre-shared Key (PSK) mode to encrypt wireless traffic will prevent all but the most technologically knowledgeable from accessing company data.

Lost Devices

Changing passwords regularly is always important to security, but never more so than when a device is lost or stolen. As soon as the loss is noticed or reported, passwords to all general equipment, access points, and routers should be changed. WPA2 can be useful here as well, using the enterprise mode and a RADIUS server to authenticate users.

Rogue Access Points

A business’ IT professionals can usually help when finding rogue access points – if only because IT professionals were often the first to create them for their own access. Using software, such as apps that detect and prevent intrusion, will cut down on the number of rogue access points. There’s also another very easy solution, labelling wall jacks and Ethernet ports. This will enable IT to see which ports are in use. If a port found being used should not be, IT knows they have a possible rogue access point.

Session Hijacking

While common, session hijacking is somewhat more sophisticated than the rest of the list. Session hijacking comes from the end-user, who may be visiting many different websites and unfortunately may pick up a problem that they aren’t aware of. Fortunately, like other solutions, this kind of attack can be prevented by the use of protocols such as WPA2, WPA PSK mode, or Wired Equivalent Privacy (WEP).

An IT department that does its due diligence may be all that a business needs to protect itself against Wi-Fi attacks. However, it doesn’t hurt to know a few easy solutions to common attacks, or to make sure the business network is as secure as possible. With security measures in place, such as the use of WEP, WPA, WPA2, and specific software, as well as monitoring the network and changing passwords, a business can keep their sensitive data safe.

The New Era of Real-Time Communications: WebRTC, IoT, and IT

shutterstock_247450882In today’s technology-driven world, communicating with people on a global level is becoming as simple as pushing a button. Real-time communications via applications and new technologies mean that users can communicate through video or voice no matter their location.

This is creating a new era in business. It’s expanding the role of the IT department, which is itself becoming more consumerized, and leaning toward business models based on outcome and software. There are a few trends that are exemplifying this new era, including:

  • WebRTC (and other browser-based communication software)
  • Internet of Things (IoT)
  • Expansion of IT

 

WebRTC

Browser-based WebRTC is the next step in real-time communications. Supported by Google, Mozilla, and Opera, WebRTC offers users access to video and voice chat through websites, application software, e-readers, and even home appliances, as long as they have an Internet connection.

Amazon’s Mayday button is an example of WebRTC. This allows Kindle users to easily access real-time communications with customer service representatives. Expanded to regular use in the business world, this kind of technology would allow all levels of a company to access troubleshooting or training on their WebRTC-enabled device – no matter where they are.

WebRTC can also help improve websites by allowing users to quickly and easily speak to a sales representative without having to download extra software. For businesses, this means that customers are able to contact the business in a straightforward and intuitive way, which leads to better customer-business relationships.

IoT

Businesses are also beginning to consider IoT devices – such as smartwatches, fitness bands, and drones – as more than something just for consumers. These devices can also have real-time communications capabilities, with a range of applications within the business world.

A smartwatch may not seem like a beneficial device for a business, but it can be used for many of the same applications as smartphones and other communication devices, including:

  • Connecting with clients and coworkers
  • Contacting field operatives
  • Process management with the business’s CRM system

Further exploration of the capabilities of the IoT will only expand the real-time communications field, leading to more advances in speech recognition, real-time alerts, real-time decision-making, and deep cognitive systems.

IT Expansion

The advancement of technology means that IT departments are no longer confined to internal services. The success of many businesses now depends on their IT department, which should be encouraged to actively work toward helping the business succeed.

The continuing advancement of the IoT means that products and services are fundamentally changed; now design, management, engineering, and operations all need to consider how they are affected by daily technology. Every part of an organization is touched by technology, from the collection and analysis of business intelligence to internal communications to customer service. By working together with the IT department, management can keep up with changing technology and better support business needs.

Real-time communications are a benefit to all levels of an organization, including their customers. Communicating through WebRTC or IoT devices is becoming increasingly accessible and intuitive, leading to more positive interactions. With these continuing improvements and with the expansion of the IT department’s role in the organization, businesses will continue to expand in the new technological era.