Posted by:Monica Samuel February 7th, 2012

Think back to the time when the Internet was born. Educational institutes and corporations worked in a frenzy to limit or totally restrict internet usage by students and employees, fearing risks of data privacy, access to inappropriate information, and loss in productivity. What happened? Tech-savvy users merely found a way to circumvent the restrictions and accessed the Internet anyway. Lessons learned? One, you can’t stop people from embracing technology. Two, change is scary but not bad.

Corporate culture has evolved over the last few decades as has the generation’s tech-savviness. The new world accepts iPhone, iPad, Android and other smartphones and tablets as normal and necessary components of life. Work life and personal time are blurring into each other. People get their work home and take their own stuff to the office.

In this new corporate age ‘enterprise loyalty’ and ‘years of service’ are no longer associated with retirement benefits or lifetime security. Employees strive to enhance their own value by upskilling constantly along with contributing to the company. New gen employees keep up with technology, even if it is not their chief competency. The one who uses technology to his/her advantage is the one who gets ahead and receives recognition in the enterprise and amongst peers.

As for each her own, professionals too have their software and devices of choice – stuff they excel at and what helps them stay competitive. Even if a corporate policy forces them to use a tool or option, if it makes their work less effective and more laborious, they will find a way to get around that barrier. Unsecured usage is scarier from the enterprise security point of view.

Today, CTOs, CSOs, and CIOs are almost all concerned about mobile device proliferation into the work space. IT consumerization has taken on a whole new dimension. The concept is hardly new though … people have been using their home PCs and networks to access official emails since years before the iPhone made an appearance. The advent of the BYOD era is only another challenge in the long run … one that has to be met head on and managed rather than avoided with ostrich policies or restrictions.

The road ahead for IT administrators is to create an environment for the safe access of corporate information across mobile devices. Instead of investing time and resources in limiting mobile device access, IT teams should work on mobile application development that incorporate layers of security and data encryption to protect data privacy; devise policies that police users’ access without being too restrictive; and educate employees for greater self-vigilance.

The rate of device proliferation has outpaced the development of mobile security measures. However, with greater acceptance of the inevitable, enterprises should come up with creative and flexible solutions that assure a balance between enterprise security and IT consumerization.

So, eager to learn why your business MUST take notice of Mobility ? Or want to decide which app is a right fit for your business? Download your choice !

Leave a Reply

Your email address will not be published. Required fields are marked *