Enterprising Developments

CIOs, BYOD and the Complications that Arise after Christmas

Joe McKendrick
Insurance Experts' Forum, December 20, 2012

Ian Gotts of Successful Workplace really nailed it with this title for a recent article: “Why the CIO Hates Christmas.”

It's not that CIOs are being Grinches, staring down from their mountain perches at all the Whos of Whoville celebrating their day of joy and togetherness.

But they are getting mildly annoyed at all the gifts being passed about. In particular, all those electronic gifts now filling stockings and piling up under the trees. Even little Cindy Lou Who may be getting a tablet computer this holiday season.

And, guess what? All the Whos will be bringing their gadgets to work. If there's anyone plotting BYOD (bring your own device) adoption patterns, it wouldn’t be surprising to see spikes in early January. Followed by sudden drops in IT department productivity in February—especially when they are told they need to support and secure these new devices.

As Gotts describes it:

“Apple has penetrated business by providing devices that are the electronic equivalent to jewelery which consumers have bought with their own money and have taken to work with them. Once inside the building, these consumers cleverly turn into business people and demand that the IT department make their Apple iThingy connect to the corporate network, approve calendar requests and send and receive any and all communications.”

Gotts goes on to suggest some positive steps CIOs can take to manage the BYOD challenge before it gets out of hand:

Establish and publicize a mobile policy: “It needs to cover at a minimum which devices are supported, who pays for the device and associated data packages, use of the device, data security, how and what applications can be loaded, what support is available (e.g. only sync, email, browser but no other apps).”

Make device management as self-service-oriented as possible: “What is the process that someone has to follow to get their device validated and connected? How much of this can be made self service reducing your support load, with links to FAQ, policy and good 3rd party support websites.?

Work closely with business users: Map out device policies and procedures “with all the stakeholders before you start building websites or applications. Hey – maybe this is a chance to show how responsive you are and a chance to try out some cloud based approach. “

Beef up your technical capabilities: “What skills do you need? The first step (Policy) and the second (Process) will determine skills required and what is available.”

Estimate the demand on your infrastructure: With a slew of new wife enabled devices connected, what will this do to your network” Does this change the policies or approach you advocate user follow?”

Joe McKendrick is an author, consultant, blogger and frequent INN contributor specializing in information technology.

Readers are encouraged to respond to Joe using the “Add Your Comments” box below. He can also be reached at joe@mckendrickresearch.com.

This blog was exclusively written for Insurance Networking News. It may not be reposted or reused without permission from Insurance Networking News.

The opinions of bloggers on www.insurancenetworking.com do not necessarily reflect those of Insurance Networking News.

Comments (0)

Be the first to comment on this post using the section below.

Add Your Comments...

Already Registered?

If you have already registered to Insurance Networking News, please use the form below to login. When completed you will immeditely be directed to post a comment.

Forgot your password?

Not Registered?

You must be registered to post a comment. Click here to register.

Blog Archive

The Good, The Bad and The Ugly Of Enterprise BI

When IT can't deliver, business users build their own applications focusing on agility, flexibility and reaction times.

The IT-Savvy 10%

IBM survey reveals best practices of IT leaders.

The Software-Defined Health Insurer: Radical But Realistic?

Can a tech startup digitally assemble the pieces of a comprehensive, employer-provided health plan?

Data Governance in Insurance Carriers

As the insurance industry moves into a more data-centric world, data governance becomes more critical for ensuring the data is consistent, reliable and usable for analysis.

Fear This

Just days before this Issue, which contains our security cover story, went to press, we got some interesting news: 1.2 billion unique usernames and passwords and 542 million email addresses were reportedly stolen from 420,000 websites, according to The New York Times. The websites ranged from Fortune 500 companies down to small online retailers.

Should You Back Up Enterprise Data to the Cloud?

Six questions that need to be asked before signing on with an outside service.

Advertisement

Advertisement