START FREE TRIAL
Buzz

The basic assumption relating to business mobile devices users is that they are friendly users. As such, they mean no harm to the organization in any manner. They might unintentionally harm the organization due to careless use or lack of awareness of security breaches. There is, however, the possibility of a minority of business mobile users who might have reverse intentions like unauthorized collection of information. A business should mitigate all the security risks that its employees might create. But there is more to it. A business should form clear organizational philosophy on how to best utilize mobility in its daily practices. Only when such a philosophy will be in place, will the business IT be able to build the proper framework to execute it.

 

Always connected

 

Always connected professionals should be the lead guideline for the business. Immediate awareness and responsiveness are the foundation for a successful organization. This is especially valid for organizations that operate intensively with many customers or channels. Executives should have continuous impact on the business, regardless of location and time.

 

Rule 1: make sure your executives and professionals are always connected and do what it takes to make it happen.

 

Doing it the right way – users are friendly

 

Business employees are essentially friendly to the organization. They wish to streamline the business daily lives and are ready to collaborate in order to achieve it. This is the salient principal for defining an enterprise mobility framework. It means that when there is the option for a harsh action or a gentle action, always prefer the kind way. Users are not aware of their conduct but they are willing to change and adjust in order to facilitate a more secured data environment and better business mobility. The business should constantly aim for buy‐in from end‐users on security and management compliance. It is about education and compromise.

 

Rule 2: treat business users as friendly users; gain their collaboration.

 

Not all employees are equal

 

A business has several executives and professional tiers. Many of them have different responsibilities and authorities. They keep different information of various levels of sensitivity. The more senior the person, the more freedom this user will take for himself. At the same time, the organization will be more tolerant to unique preferences of top professionals. This diversity requires different policies for different user groups. Business IT should be prepared to enforce diverse business mobility philosophies on various users groups. This might require utilizing different tools across the organization as no one tool provides total flexibility to fulfill disparate practices.

 

Rule 3: deploy adjusted policies based on users' groups attributes.

 

More rules in our next post.

 

By Noam Potter

Privacy Preference Center

Necessary

These cookies are used to guarantee site logged-in to the server and proper site operation.

wordpress_e0e89334ac52a69b56ac8982b9a3784d wordpress_logged_in_e0e89334ac52a69b56ac8982b9a3784d, wp-settings-2, wp-settings-time-2, wpe-auth

Advertising

These Google cookies are used for re-targeting, optimization, reporting, and attribution of online adverts and remarketing activity.

IDE, NID

Analytics

These third party cookies are used to collect information about how visitors use the site. The information is used to compile reports to improve the site. The cookies collect information in an anonymous form, including the number of visitors to the site, where visitors have come to the site from and the pages they visited.

1P_JAR, APISID, APISID, DSID, DV, HSID, OTZ, __ncuid, _ga, __utmx, __utmxx

Preferences

Various unique identifiers by Google, which stores your preferred use options.
Google sets a number of cookies on any page that includes a Google product such as Google Map and YouTube. While we have no control over the cookies set by Google, they appear to include a mixture of pieces of information to measure the number and behavior of Google tools users. This may include information that links your visits to our website with your Google account if you are signed in to one. Information about your use of our website, including your IP address, may be transmitted to Google and stored on their servers. These cookies may not identify you personally unless you are logged into Google, in which case it is linked to your Google account.

APISID, DSID, DV, HSID, SAPISID, SID, SIDCC, SSID