Podnutz – The Computer Repair Podcast #227 – Bring Your Own Device

Direct MP3 Download: Podnutz – The Computer Repair Podcast #227 – Bring Your Own Device


Live Call-In Show for Computer Repair Techs every Sunday at 4:00-5:30pm EST

Hosted by: Jeff Halash from TechNutPC.com

Google+ Jeffery Halash

Twitter: TechNutPC  

Paco Lebron from ProdigyTeks

John Dubinsky from Maven Group

Shayna Pittman from Red Agent Solutions

Computer Repair Podcast #227 Video

To send a voicemail or to be on the show live, call 1-888-697-0162

Email: Podnutz@Podnutz.com

Support This Show

Patreon.com/ComputerRepairPodcast

 

Show Sponsors:

NINJA

Try it Free at Info.NinjaMSP.com/Podnutz

 

Topic: How to manage bring your own device clients.

 

Sign up to be a guest on The Computer Repair Podcast or Podnutz Daily by sending an E-Mail to Guest@Podnutz.com

 

Links:

Tip: Be Nice

Tip: Document, Document, Document

Aisle8/Araknis

Bring Your Own Device (BYOD)

Use MDM (Mobile Device Mangement) to assist with BYOD

MDM ‘example’ – not a endorsement

Bring Your Own Device (BYOD) | AirWatch

MDM & Enterprise Mobile Solutions | MobileIron

XenMobile – Enterprise Mobility Management (EMM … – Citrix

Thoughts BYOD

  1. How does BYOD culture affect your culture of compliance?
  2. BYOD does increase your risk.
  3. BYOD will increase your (techs) work load.
  4. Considering… Requiring notification.

Reasons To BYOD

– Save Money

– Increase productivity

– Employee moral

Rules For BYOD

Items that any business currently building a BYOD strategy must consider.

  1. It must clearly be outlined what specific devices are permitted for work use.  Train your employees.
  2. The company/organisation must have the ability to remotely delete company-sensitive data from mobile devices without the device owner’s permission.  The device should be set up FOR them for access to company informaiton.  Access should be limited.
  3. Adotp best practices.  Ignore user whining.
  4. Written policies should be put into effect that correspond with terms of use policies and any guidelines pertaining to remote/home workers or the sharing of sensitive data. 
  5. Employee privacy should be discussed within the BYOD policy since employees often use these devices to check personal data. 

Alternatives To MDM:

MAM – Mobile Application Management

TrendMicro Suggestions

QuickBooks – Says You Should BYOD

Thoughts from Wired Magazine

Software Tips:

Shut Up 10

Amazon Services

** USE www.podnutz.com/amazon

SilverStone Technology Dual M2 to PCI-E X4 and SATA 6G Adapter Card (ECM20)

ZTC 2-in-1 Sky 2.5” Enclosure M.2 (NGFF) or mSATA SSD to SATA III Board Adapter. Multi Size Fit with High Speed 6.0GB/s. Model ZTC-EN005

SilverStone Products

Funny Craigslist Ad

Microsoft Not Supporting New Chipsets

Microsoft Will Block Windows 7 & Windows 8.1 From Updating On Newer CPUs – TechRaptor