Building Your Plan for BYOD!
As the line between working in-office and working from home becomes more and more blurred, a new trend in employee technology has begun to emerge – BYOD, or bring your own device. Many companies are offering their employees the option to bring their own devices into the office environment as it can improve both employee satisfaction and office productivity. But CIOs still must consider three different basic set ups/options before taking the plunge:
- Bring Your Own Device (BYOD) – In this set up an employee has complete control over choosing and supporting the device they use at work since it is fully owned by the employee. This is a very popular method with smaller companies or those who utilize independent contractors.
- Choose Your Own Device (CYOD) – In this set up employees are offered a choice of devices that have been approved by the company for their security, reliability, and durability. The approved devices work within the company’s IT environment, however the device itself is owned by the employee; either they have paid for it themselves or it was paid for through a company stipend and the employee can keep it for the length of their employment.
- Company-issued, Personally-Enabled (COPE) device – Here an employee is supplied a phone or other device, paid for by the company, that they can use for personal activities. The employer can decide how much access and freedom employees get when using these devices. This is the closest option to the traditional Corporate Owned Business Only (COBO) model of old.
While CYOD and COPE are often employed in larger organizations, BYOD is by far the most popular option with SMB’s. There are many benefits to the new BYOD office set up. When employees are totally familiar and comfortable with their own devices they are likely to be more productive since they do not require any time or training to get up to speed on optimal usage. Additionally, personal devices, as opposed to business owned, oftentimes are the latest model with all the latest updates and features. Early adopters love having the latest version of their preferred device and companies can leverage that desire to their advantage.
A further advantage to adopting BYOD is cost savings to the employer. By having people responsible for part or, in some cases, all of the cost of their mobile devices, businesses can potentially reduce the impact of mobile device costs on their bottom line.
If and when your company adopts a BYOD policy, the best way to ensure that you do not encounter an excessive surge in calls for help to your IT team is to have strong and comprehensive BYOD guidelines in place. Here at Midwest IT Solutions we have worked hard to research and develop guidelines for our clients to follow. Any policy should encompass seven key areas:
- Specify what devices are allowed. You will be getting into the business of saying, yes iPhone, no Android, yes iPad no any other tablet. Once you have decided what devices are allowed it is key to make clear what level of support (if any) you will offer owners of these devices.
- Establish strict security protocols for those devices.
- Define a clear support policy i.e. what level of IT support will you (the employer) provide?
- Decide which Apps will be allowed, which will be banned.
- Make clear who owns the apps and data used on the employee’s devices.
- Be sure that your BYOD policy is aligned and fully integrated with your current Acceptable Use policy.
- Be sure to come up with an employee off-boarding plan.
There are many factors to consider before any manager or executive rolls out a new BYOD policy. A successful BYOD policy can aid in productivity and employee satisfaction, a less detailed BYOD policy can lead to security breaches and numerous IT headaches.
At Midwest IT Solutions we can help you navigate through the complex new world of BYOD. With Midwest IT Solutions’ guidance, you will be able to leverage the wonderful benefits of BYOD without facing the many pitfalls. Do not try to chart your own course through this exciting world, contact us today!
As of July 29, 2015, Microsoft launched Windows 10 for PCs and tablets, which is a free upgrade to Windows 7 and Windows 8.1 users. According to Microsoft, Windows 10’s features include:
- Cortana: A personal digital assistant tool that learns individual preferences to provide users with recommendations and access to information. In addition to voice commands, you can use Cortana to set reminders and add calendar events.
- Microsoft Edge: A new, customized browser that offers content and results based on individual interests and preferences. It features a text-only reader mode, annotation tool, and Cortana integration.
- Windows Hello, Microsoft Passport, and Windows Defender for anti-malware and spyware protection.
So how can we help with all of this? Partnering with an MSP can maximize usage, and smooth out your transition to Windows 10. The most important benefit is to make sure the network and operating system is ready for Windows 10. The personal touch and customer service of a Managed Service Provider can facilitate that transition and give you peace of mind when it comes to not only transitioning your operating systems, but also your employees.
What We Can Do:
- MSPs can help you stay organized and ahead of the game by letting us, the experts, control the computer and network aspects of your business.
- System compatibility. Are the PCs in your office ready for Windows 10? Having an MSP proactively monitor and maintain the network will aid in making sure your system is ready to be upgraded. Regular network assessments will also prepare you for not only Windows 10, but other technological transitions you may have.
- Questions or Concerns. MSPs can showcase their Windows expertise, and customer service, by answering customers’ questions and concerns about Windows 10.
In conclusion, having an MSP on your side during this transition is beneficial for your business as it allows you to focus on your business critical functions that help you grow. Let us, the experts, help you get organized and prepared to prevent downtime and confusion for you or your fellow employees.
It’s no secret that cloud computing is the future of computer and network care for businesses worldwide. “The cloud” eliminates the need to have physical servers and hardware in your office. Cloud computing focuses on maximizing the effectiveness of the company’s shared resources, as well as being effective in heightening companies’ day to day tasks with multiple users. It is a highly efficient way to store your company’s data in one place at a flat monthly cost, as opposed to worrying about the large capital investment of new network equipment on a regular basis.
Cloud adoption and cloud-based file sharing are becoming increasingly popular among the general public, but can cause concern among CIOs. Unfortunately, IT organizations are having a hard time keeping up with large, public cloud providers. According to an article from Business Cloud News, a recent survey conducted by Fruition Partners of 100 CIOs found that 84 percent believe cloud adoption reduces their organization’s control over IT.
About nine in ten believe unsanctioned use of public cloud services has created long-term security risks. This is troubling to CIOs because it can lead to possible information leaks or other data security breaches. In addition, 79 percent of CIOs believe that there are cloud services in use that their IT department is not aware of. This reiterates the danger of losing grasp of the company’s technology while using a large cloud provider.
Partnering with a Managed Service Provider (MSP) can help prevent these worries from arising. A proactive relationship with an MSP gives you the ability to aid in, or fully move, to a private cloud option. It ensures that your company will be working with a partner that has experience with many cloud networks, therefore providing the highest level of support possible. This is crucial when it comes to the transition of moving your company’s data and file sharing for all users within your company at an affordable cost, while at the same time, preventing downtime on the network.
In conclusion, the value of having an MSP on your side to aid in cloud based technologies for your business is second to none. Small to midsize companies can focus on the core competencies of their business that make them money, while letting the experts control all business technology in the cloud.
Why Midwest IT? Because it makes sense!
If you watch HBO’s Silicone Valley you may have seen how on the show they used WiFi Pineapples to hack into a tech conference’s WiFi and have their Pied Piper software collect the attendee data they needed. Sure it’s only a TV show but WiFi Pineapples are real and super accessible (they cost about $100 a piece). Though it’s highly unlikely a massive tech conference would have such flimsy network security and other protocols in place, this is a good opening to talk to your staff about their real life public WiFi usage and data security. In real life, it’s actually pretty common for hackers to take advantage of large scale public networks like the ones in, hotels and shopping malls.
Public WiFi connections are readily available in most places today and they can make life so much easier. But common doesn’t equate to secure and not all free WiFis are created equal. It’s actually very easy for a hacker to pick up your credentials just by being on the same network. Of course the best protection can be just to avoid connecting to public WiFi completely and just use your phone’s data. But if you don’t want to use data on your smartphone to connect or tether your PC to, here are some things to keep in mind:
- Gauge which connections available to you, airport or shopping mall WiFi connections are potentially more risky that your neighborhood coffee shop or small chain retailer. Large or high traffic networks are also at more risk for hackers who use WiFi Pineapples to redirect them to their fake network. Be wary when scanning for a connection and you see similar WiFi network names pop up. If you’re device is ever connected to a pineapple they try and intercept your information. You can prevent this by only using HTTPS pages since they can see everything you do when connected to HTTP.
- On top of using HTTPS, make sure you have SSL enabled for all applications that access the internet.
- Always pick a connection that requires you to enter a password. These types of connections will have at least a basic level of encryption. On a totally open network, anyone can see everything you’re doing.
- Three letters: VPN. With the FCC’s privacy rulings being recently overturned, VPNs should be used whenever possible, even while at home or in the office.
- Turn off file sharing and printer sharing. If you have it turned on, you’re just making it that much easier for a hacker to slip in and look at your personal information or possibly plant some malware.
- Common sense, just use it. Blogs, new sites, general browsing is fine. Feel like doing some online shopping or banking? Forget it, just wait until your back in a trusted WiFi network.
- If you’re on a laptop, make sure your firewall is enabled.
- Keep your antivirus and antimalware up to date on all devices.
If you need help double checking any device settings, make sure you reach out to us for additional counsel.
- Use Google Search
Before you start to type the name of a website you have never been to before, try googling it first. Google actively scans just about every website and looks for malicious (harmful) code. If it finds something, it will warn you in the search. Google will also ensure that you end up at the page you are looking for. After googling, be sure to read the information provided below the link in order to learn about the website.
- Don’t click ANY advertisements
First of all, there is no such thing as a coupon printer. Plain and simple; they do not exist. Secondly, there is no such thing as a good advertisement. Sure, some will take you to the place you want to go to see some golf club or purse, but it is safest to assume that all ads are bad. If you find that ads are starting to market directly to you that means you have been clicking on them and they are tracking what you are interested in. It may seem easier to click a well-targeted add to see the new fall lineup or a new car, but the more you click ads the more likely you will run into malware. Just google the new fall lineup or car and view it directly on their site.
- The “YOUR COMPUTER IS INFECTED” banners
No website can tell you what is on your computer. You have to allow a program access to scan your computer before it can tell you what is there. Completely ignore any banner or website that tries to tell you how many things are wrong with your computer. These banners are the birthplace of most adware and malware. More often than not they will infect and slow down your computer and never fix any real issues.
- Check the address of the site you are on
Does it look like the site you should be on? “Phishing” or “Spoof” websites are designed to look exactly like another website. Here is an example:
This site is setup to look as much like Citibank as possible in an attempt to get credit card information. A foolproof way to ensure you are on the correct website before entering secure information is to review the address bar where the webpage link is located. As you will see in the example, the address is https://web.da-us.citibank.com/… Does this look familiar? Try to google Citibank and see what google reports as their webpage. After googling, you will notice that Citibank’s website looks like this: https://online.citibank.com/US/JPS/portal/Index.do. Also, take a hard look at the website itself, does it look official? If you are in question at all, close the window and try Google searching to find the correct location for a website.
- Check for a SSL Cert
Without getting too technical, SSL certs provide a secure (protected) connection from your computer to the website you are on. That is to say, any data or communication passed from your computer or the website cannot be read by anyone else along the line of communication. You will want to check for these certs on every site that you are entering any confidential information. Below you will see examples of where to check for SSL certs on the common browsers:
– Internet Explorer 11
Essentially what you are looking for is the ‘s’ at the end of http’s’://www.google.com. Some browsers represent the secure connection as a green lock. If you don’t see the ‘s’ or the green lock, do not enter in any confidential or even personal information.
- Password use
This can be covered in a topic all by itself but I will touch on it slightly. If you are someone who does not like to keep different passwords for every site, I urge you not to use the same password for everything. Something you can try is to keep a few different passwords and use them for varying levels of security. For example, there will be some sites that ask you to create an account just to view their items for sale. Do not use the same password as your online bank account. Use a password you would not mind if it got stolen and continue to use that password for all sites you could care less about. Another note, if you save your passwords in your browser to ‘Auto-Fill’ realize that someone with access to your computer can now log into every place that has a stored password. If you sync your passwords using google so that all devices have the same saved passwords, realize that your google account password now needs to be the most secure. Someone just needs that one password to