9 tips for communicating your BYOD policy
by Ryan Kalember - Chief Product Officer at WatchDox - Monday, 28 July 2014.
Follow up

Most people need to hear new information a minimum of three times before they can absorb it. In other words, if employees only hear about BYOD procedures at orientation or at a yearly IT lunch-and-learn, chances are theyíre not going to retain much. After any meeting or presentation, give employees clear next steps and establish checkpoints to ensure that teams are following through. Find new and interesting ways to get the BYOD message across throughout the year, such as sharing news about security breaches, along with a quick list of BYOD reminders.

Enlist managers

As capable as your IT team is, it should not be the sole enforcer of BYOD policy. Instead, enlist managers throughout the company to help with implementation by equipping them with the training and tools that they need to ensure their teams donít go rogue. Ideally, managers serve as the eyes and ears of the IT department, calling out colleagues for security faux pas and reminding them how to safely share, edit and collaborate on company files.

Survey

Are employees aware that your BYOD policy exists? Is there any aspect of it that theyíre electing not to follow? What kind of support do employees need from the IT department? How often are they using personal devices for work? These donít have to be hypothetical questions. Periodically surveying employees can be an excellent way to ensure that your communication efforts are working. Additionally, the more you know about how your teams feel about the current BYOD policy, the better you can tailor it to fit their needs.

Create a plan of action

A communications plan is not just a list of tactics. Devote time to planning ahead, developing materials and scheduling training sessions, lunch-and-learns, email campaigns and so on. Assign actions to various members of the team to ensure things actually get done. While this may sound like a lot of work, it will pay off in the long run when employees are educated about why your BYOD policy exists, what it entails and what steps they need to follow.

Thereís no doubt that weíre in the midst of a workplace transformation. As technology continues to make us more productive, security threats are becoming increasingly prevalent and complex. For companies that want to take advantage of the benefits of modern technology without inviting security risks, employees can sometimes be the biggest liability. But with a clear BYOD policy and smart communications plans, you can turn them into your biggest assets.

Spotlight

Whitepaper: Zero Trust approach to network security

Posted on 20 November 2014.  |  Zero Trust is an alternative security model that addresses the shortcomings of failing perimeter-centric strategies by removing the assumption of trust.


Weekly newsletter

Reading our newsletter every Monday will keep you up-to-date with security news.
  



Daily digest

Receive a daily digest of the latest security news.
  

DON'T
MISS

Mon, Nov 24th
    COPYRIGHT 1998-2014 BY HELP NET SECURITY.   // READ OUR PRIVACY POLICY // ABOUT US // ADVERTISE //