Workers Who Use Their Own iPhones at Work

by | Nov/28/2013

BYOD – Bring Your Own Device. Many companies are doing this. Employees like to have just one device to carry, companies don’t want to buy Androids or iPads for every employee, and other benefits make this look appealing. But what about security…

Using a personal device for work purposes can be like trying to mix oil with vinegar.

IT is going to want you to be secure. They want to enforce that all users have passwords and reset the passwords every 90 days, restrict what applications the users can use, remotely track and wipe the data on the device in the event of a theft or loss, control the use of the camera, and other settings.

Workers resist those intrusive controls. Additionally, workers want to be sure members of the IT department cannot see the worker’s private, and sometimes intimate, conversations with their loved ones. Or anything else.

Use management software if you need to, and just make sure your workers all have passcodes on their devices (a good idea anyway) that they are not allowed to share with anyone.

Leaders at some organizations decide to exit the whole BYOD Bring Your Own Device methodology and issue new, or sometimes refurbished devices for the users to use at work.

This is a huge topic that so many companies battle with. Please post your comments about how your organization is dealing with BYOD…


  1. Greg OBrien

    I’m using a lot of iphones in the enterprise now. Looking for the best enterprise management software for iphones. Any recommendations?

    • Mike Foster

      Many of my customers really like Remote management tools that include security and management features such as application control include AirWatch, MobileIron, Zenprise, and Mobile Device Management. Microsoft Exchange offers management of some remote devices. Other tools that provide other security measures – such as remote wipe and / or other protection – include TouchDown from NitroDesk, eset mobile security, McAfee Wave Secure, WatchGuard Mobile Security, F-Secure Mobile Security, Kaspersky Mobile Security, Trend Micro Mobile Security, ESET Mobile Security, etc. See the Apple web site for information including the document called, “Deploying iPhone and iPad Mobile Device Management.”


Submit a Comment

Your email address will not be published. Required fields are marked *