Sponsored: It is no secret that the proliferation of internet-connected technologies, such as smart phones and tablets, has presented new opportunities for modern enterprises.
To take full advantage of the opportunities presented by these technologies, is critical that the appropriate internal protocols are in place.
Internal protocols and policies need to be designed with an overarching direction in mind, otherwise there is the risk of reduced productivity and potential vulnerability to cyber-attacks.
The FreeMove Alliance aims to empower multinational corporations with a few good practices that can be followed for mobile management. With the appropriate policies in place, such organisations are able to take full advantage of personal devices, whilst reducing the threats posed by external networks.
IT service management (ITSM) integration
The increasingly distributed nature of modern enterprise has driven the evolution of ITSM. This has led to new challenges, especially in regard to meeting the demands placed upon IT support and the associated management of home devices.
Utilising corporate-wide guidance regarding ITMS integration allows for the effective management of performance and service costs. With these approaches in place, more time can be devoted to developing strategic initiatives.
Automation for mobile management
With many multinational corporations embracing remote working, automating repetitive and monotonous tasks has become a popular method for enhancing productivity. However, there is the risk of ad hoc tools being developed in certain regions, which would not facilitate a seamless flow of information across the corporate network
By standardising the internal methodology for automated systems, a uniform approach can be achieved throughout the company. This allows automated systems to effectively work together throughout an organisation and ensures they can be efficiently deployed across the corporate network.
Ensuring security in mobile management
One of the most important policies in modern enterprise will relate to cybersecurity. It is therefore important that all device passwords are robust and that IT teams have the ability to remotely wipe any lost or stolen corporate devices.
Yet, with the current trend for remote working, insider threats should not be discounted. This not only includes disgruntled staff, but malicious actors who may have gained access to personal devices and home networks.
One solution is to ensure that only corporate devices connect to the company’s network and that personal devices are banned from connecting to it. A secure virtual private network (VPN) can also prevent contamination when remote working.
However, in order for these measures to be effective, they require stringent corporate-wide adoption, as this will avoid any potential gaps in the network’s defences.
Impact of bring your own device (BYOD) policy
Personal devices are now generally just as powerful as corporate equipment, and employees can become frustrated by having to carry two smart phones. Companies can take advantage of their employees’ devices by implementing a bring your own device (BYOD) policy. With such a policy in place, personal devices can be used, provided appropriate security precautions are in place.
A keen eye on acceptable use policy
Advice regarding appropriate use of corporate technologies should be central to internal guidance documents. Not only does this highlight the expected level of professional behaviour, it ensures that distractions are kept to a minimum and that corporate resources are used appropriately.
The acceptable use policy (AUP) must be enforced for all company-owned devices, as well as all equipment (both personal and company-owned) that connects to the corporate network. Therefore, it is crucial that all users are made aware of the policy.
Alongside this, external-contractors that use corporate devices will require specific consideration when developing the AUP.
Good practices in mobile management
Whilst some generic points are useful, such as mandatory two-factor protection, a one-size fits-all approach leads to inefficiencies. The business sector and sensitivity of the information handled will influence the legal and security aspects of any internal guidance.
Best practice guidance documents need to be designed to suit each company. These bespoke solutions will necessitate a full understanding of how an organisation operates, for the optimum guiding principles to be defined.
However, these guidance documents will continually need to be revised and updated in line with how a business expands. Failing to do so, can lead to restrictive policies and out-dated recommendations.
With the appropriate measures in place, multinational corporations will be able to optimise productivity and efficiency.