Helping clients manage their technology for over 30 years.

3 Steps to Closing the BYOD Gap

BYOD Policy – BYOD Gap

In my last post, I discussed the gap between business units that enthusiastically embrace BYOD and IT departments, where BYOD is regarded with more hesitation.

Yet it’s clear: BYOD is not only here to stay, it is quickly becoming a dominant force that IT departments must deal with. And in most circumstances “just say no” isn’t an option; BYOD offers employees too many rich opportunities to boost productivity, innovation, and collaboration.

So what’s an IT department — your IT department — to do? Continue reading

The BYOD Gap

Navigation concept

What’s the state of Bring Your Own Device (BYOD) in your organization?

When I ask this of our customers I get replies aligning with industry research and other anecdotal evidence pointing to what I call the BYOD gap.

Business units are adopting BYOD – along with mobile apps and consumer-grade cloud services – pretty much as fast as they can, but too often such adoption is unsanctioned by their IT departments; there is no BYOD policy.

In the shadows

It’s a sizable gap, too: by some reports, almost 90% of employees use their own devices at work – but only about 40% of enterprises have committed to implementing BYOD policies, procedures, and infrastructure.

This is classic Shadow IT, and it’s on a scale unlike anything since the 1980s when corporate business units defied their IT departments to acquire PCs. It took mainframe-obsessed IT staff a good long time to grasp that forbidding PCs was a supreme waste of time, because whenever business unit managers find tools enabling them to boost productivity and achieve better results, they are enthusiastically embraced whether IT likes it or not.  Continue reading

5 Capabilities That Your Wireless Network Needs Now

wireless network management

We can’t afford to ignore the myriad of mobile devices and apps currently saturating our attention and wireless connections.

In my last post, I laid out some of the industry’s eye-popping numbers. This time, I’m offering up just one graphic (from Cisco’s recent Global Mobile Data Traffic Forecast Update) showing why you must upgrade your network infrastructure. Pronto. Continue reading

Getting the IT Staff You Need May Not be as Easy as You Think

Man contemplating a decision

According to Computer Economics’ 2014/2015 IT Spending & Staffing Benchmarks report, hiring of IT professionals is finally on the upswing — yet another indication that our long-declining economy continues to improve.

Even so, you may not have an easy time finding the right IT expertise when you need it. That’s because there’s something of a squeeze going on (you know, the one that puts you between a rock and a hard place):

Continue reading

Apps, Apps Everywhere — But How Secure Are Yours

Did you know that your applications are the most vulnerable part of your IT operations?

iPhone with lock to symbolize Cloud Security. Cloud in background

These days, problems with apps — many of them web-based apps — account for the majority of information security breaches. Over the last year or so, and going forward, application-level attacks have emerged as the preferred vector for gaining access to sensitive (and valuable) data. What’s more, the threats are becoming increasingly acute as complex web apps, as well as mobile apps, play ever greater roles in our business and personal activities.

App vulnerabilities for sale — cheap at the price? Continue reading