Attend IT Limited Blog

By accepting you will be accessing a service provided by a third-party external to

Set a Mobile Policy for Your Own Good

Set a Mobile Policy for Your Own Good

Mobile devices (as their name would suggest) go everywhere, including the modern office. As such, it is likely that your employees will want to take advantage of their capabilities to accomplish more of their responsibilities and tasks. This can be advantageous to your business, assuming that you have a well-thought-out mobile device policy in place.

Let’s discuss a few things that need to be included in one of these policies so you can make yours as effective as it can be (whether you’re first implementing it or you’ve had one for a while that needs a refresh).

Keeping Things Secure

While mobile devices can provide considerable benefits to your business, these benefits will be moot if your security is compromised via these devices. Therefore, you need to make sure that your mobile device policies contain guidelines to help - and yes, make - your employees use their devices more securely. While these examples aren’t a comprehensive list of precautions to make (and the same can be said for any of the examples in this blog), they do help illustrate the kinds of precautions and restrictions you will have to enforce:

  • All mobile devices must be protected by a password that meets the standards set by your company’s guidelines, and set to lock automatically if idle for a set amount of time.
  • Any applications must be approved by the company before they can be installed and used for work purposes.
  • Any devices not included in the BYOD policy, or are not supported by it, may not connect to the business’ network.
  • If a device is misplaced, IT detects a threat on it, or the owner leaves the company, IT may wipe the device to protect company data.

Managing Risks

Of course, while you always need to have security measures in place, it can greatly help to have the means of minimizing threats before any can materialize… especially those that originate from inside your organization. Your mobile device policy is a good place to outline the protections you have in place, and what you reserve the right to do with them to protect the good of the company. For instance:

  • All devices that are lost or stolen should be reported to IT within 24 hours, and the mobile carrier should be notified immediately.
  • Any employee who uses their mobile device does so knowing that it signifies their consent to the acceptable use policy, and their intention to abide by it.
  • Any mobile device may be disconnected from the company network or have its access to services revoked without notice.
  • While IT will make their best efforts to preserve a user’s data, any device that needs to be remotely wiped for security purposes will be wiped to protect the company. This means the user is responsible for maintaining their own backups.

Acceptable Device Use

Finally, you need to make sure you include a section in your guidelines that dictate how these devices can be used in the office (or out of it, for that matter) to conduct work tasks. Some will be based on your personal preferences, while others are more related, again, to your security. A few sample policies that your overall mobile device policy should include are:

  • Designated guidelines clarifying the differences between business and personal use of devices, and what is acceptable for either on company time - and what is not allowed at any time, like storing illegal materials or conducting harassment.
  • A comprehensive list of business materials and resources that an employee can access with a mobile device.
  • All approved applications that may be downloaded, as well as those that may not be, such as those not acquired through Google Play or the App Store.
  • Websites that may not be accessed via the business' network.

Interested in learning about a mobile device policy, and what it needs to contain, in more detail? Reach out to us! Our professionals can walk you through each point in detail, assisting you in creating and enforcing protections for your company that work. Give us a call at 020 8626 4485.

VoIP’s Benefits are Numerous
Who Fixes Broken Technology with Managed Services?


No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Wednesday, August 05 2020

Captcha Image

Mobile? Grab this Article!

Qr Code

Tag Cloud

Security Technology Network Security Business Computing Tip of the Week Best Practices Cloud Productivity Managed IT Services Disaster Recovery Hosted Solutions Privacy communications Backup Data Recovery Malware Hackers Data Business Data Backup Outsourced IT Innovation VoIP Cloud Computing IT Services Productivity Email Small Business Software Mobile Devices Computer Business Continuity IT Support Efficiency Cybersecurity IT Support Internet Saving Money Hardware Upgrade Internet of Things Automation Business Management Smartphone Microsoft Managed IT services Server Phishing Managed IT Information Technology Mobile Device Management BDR Mobility User Tips Collaboration Compliance Artificial Intelligence Avoiding Downtime Network Save Money Risk Management Managed Service Provider BYOD Budget Windows 7 Spam Remote Computing Computers Firewall Passwords Smartphones Cost Management Meetings Ransomware Virtual Private Network Gadgets Data Management History Communication Quick Tips Password Covid-19 Hosted Solution Saving Time Remote Work Automobile Data Breach Microsoft Office Printing Data Security Google Human Resources Windows 10 Personal Information Redundancy Tech Term Android Networking Wireless Employer-Employee Relationship Document Management Telephone Systems Router Content Filtering IT Service Paperless Office Manufacturing Managed Service Devices Training Recovery Marketing Wi-Fi Hybrid Cloud Hard Drives Value Audit Conferencing Business Technology Solid State Drive VPN MSP Workplace Tips Remote Workers WPA3 Online Storage Transportation Apple Update Help Desk E-Commerce Legal PCI DSS Antivirus Wasting Money Dark Web Streaming Media App Social Media Copiers intranet Remote Monitoring Instant Messaging Proactive IT Private Cloud Evernote File Storage Customer Relationship Management Going Green User Error Wireless Internet Administration Mobile Computing Applications Payment Cards Word Education Cleaning Wireless Technology Regulations Compliance Holiday Computing Amazon Content Filter SaaS Managed IT Service Voiceover Internet Protocol Work/Life Balance Payroll Vulnerability Regulation Machine Learning Mobile Bandwidth Mobile Device OneNote Government Voice over Internet Protocol Video Conferencing Data Loss Hacking Gamification Colocation Phone System AI Application Data Protection Money Managed Services Entertainment Samsung Analysis Virtual Assistant Nanotechnology Professional Services Workers Disaster Monitoring Business Telephone Browser Office 365 Black Market Chromebook e-waste Outsource IT Fiber Optics Save Time Smart Technology Hacker Azure Backup and Disaster Recovery Time Management Social Engineering Two-factor Authentication End of Support Flexibility Mobile Office Proactive HIPAA Alexa for Business Cybersecurty Travel Encryption Electronic Medical Records Management Printers iPhone Computer Repair Lifestyle The Internet of Things Smart Tech Vendor Windows Server 2008 Project Management Students Utility Computing Windows 10 Cybercrime SMB Active Directory Virtualization Operating System Break/Fix Workstations Window 10 Software as a Service Spyware Commerce Facebook Development Downtime Financial Technology Upgrades Printer IoT Telephony Big Data Connectivity Employee-Employer Relationship Business Intelligence Employees Users Office Unified Communications Advertising Windows Server Shadow IT HaaS 5G Tech Support PowerPoint Accessory Internet Exlporer Organization Keyboard Gifts Data Theft Politics Charger Identity Threats NFL Maintenance Managing Stress Emergency Display Consultant Windows Investment Communitications Comparison Language Vendor Management USB Books Testing Social OneDrive Workstation Storage Worker Commute Scam Excel Security Cameras Processor Licensing Data Privacy Television CrashOverride Medical IT Net Neutrality Fraud Peripheral Emails IT Solutions Humor Micrsosoft Experience Scams eWaste Google Assistant Co-Managed Services HBO Search ROI Hosted Desktop Google Drive Specifications Computer Care Virtual Reality Camera Sabotage Telework Chrome Sports IT budget Financial PDF Best Practice Benchmarks Hard Drive eCommerce Edge Access Control Webinar WIndows Server 2008 How To Digital Signage Alert Credit Cards Employee Managed Services Provider Windows Ink Device Security Worker Twitter Telephone Touchscreen Windows Server 2008 R2 Smart Devices Sales Virus Unsupported Software Projects WiFi Data Storage Relocation PC Audits Cortana Blockchain Bring Your Own Device iOS Sync Apps Law Enforcement Robot Google Docs Ciminal Memory Admin IT solutions Patch Management Current Events FAQ Music Root Cause Analysis Facebook Privacy Google Maps Battery Computer Forensics Hyperlink IT Management Policy Troubleshooting Retail App store Updates Unified Threat Management Screen Mirroring Video Games Smartwatch Solutions Identities Computer Accessories Text Messaging Settings Reputation YouTube Internet Service Provider Microsoft Excel Windows 10s Outlook Adobe Wireless Charging Analytics Augmented Reality Point of Sale Gmail Wasting Time Scalability Procedure CRM Miscellaneous Websites Company Culture Mobile Security Information Myths Tablets Microsoft Word Safety Cast Health Server Maintenance Inventory Legislation Computer Fan Office Tips Business Strategy Holidays File Sharing Identity Theft Keyboard Shortcuts Hard Disk Drive Shortcut WannaCry