The basic assumption relating to business mobile devices users is that they are friendly users. As such, they mean no harm to the organization in any manner. They might unintentionally harm the organization due to careless use or lack of awareness of security breaches. There is, however, the possibility of a minority of business mobile users who might have reverse intentions like unauthorized collection of information. A business should mitigate all the security risks that its employees might create. But there is more to it. A business should form clear organizational philosophy on how to best utilize mobility in its daily practices. Only when such a philosophy will be in place, will the business IT be able to build the proper framework to execute it.
Always connected professionals should be the lead guideline for the business. Immediate awareness and responsiveness are the foundation for a successful organization. This is especially valid for organizations that operate intensively with many customers or channels. Executives should have continuous impact on the business, regardless of location and time.
Rule 1: make sure your executives and professionals are always connected and do what it takes to make it happen.
Doing it the right way – users are friendly
Business employees are essentially friendly to the organization. They wish to streamline the business daily lives and are ready to collaborate in order to achieve it. This is the salient principal for defining an enterprise mobility framework. It means that when there is the option for a harsh action or a gentle action, always prefer the kind way. Users are not aware of their conduct but they are willing to change and adjust in order to facilitate a more secured data environment and better business mobility. The business should constantly aim for buy‐in from end‐users on security and management compliance. It is about education and compromise.
Rule 2: treat business users as friendly users; gain their collaboration.
Not all employees are equal
A business has several executives and professional tiers. Many of them have different responsibilities and authorities. They keep different information of various levels of sensitivity. The more senior the person, the more freedom this user will take for himself. At the same time, the organization will be more tolerant to unique preferences of top professionals. This diversity requires different policies for different user groups. Business IT should be prepared to enforce diverse business mobility philosophies on various users groups. This might require utilizing different tools across the organization as no one tool provides total flexibility to fulfill disparate practices.
Rule 3: deploy adjusted policies based on users' groups attributes.
More rules in our next post.