{"id":2682,"date":"2016-03-10T16:28:53","date_gmt":"2016-03-11T00:28:53","guid":{"rendered":"https:\/\/blogs.poly.com\/?p=2682"},"modified":"2016-03-10T16:28:53","modified_gmt":"2016-03-11T00:28:53","slug":"why-small-businesses-should-be-thinking-about-mobile-device-management","status":"publish","type":"post","link":"https:\/\/blogs.poly.com\/why-small-businesses-should-be-thinking-about-mobile-device-management\/","title":{"rendered":"Why small businesses should be thinking about mobile device management"},"content":{"rendered":"
The debate that has emerged over the Government’s request for Apple to create a one-time backdoor to access encrypted data on a locked iPhone 5C has brought attention to Mobile Device Management (MDM). While MDM is not new, it has yet to catch on with many small businesses. Understanding how MDM could have resolved the iPhone data access issue \u2013 and more – may encourage small businesses to think about an MDM investment.<\/p>\n Among small businesses, there is a growing reliance on mobility to support flexible and remote workers and to remain competitive (see: \u201cUC Summit 2015: Industry identifies key Unified Communications issues\u201d<\/a>). As a result, they need a way to manage and secure mobile devices<\/a> \u2013 laptops, smartphones and tablets – whether they supply them or enable employees to use their personal devices under a Bring Your Own Device (BYOD) policy. MDM answers the need.<\/p>\n As Small Business Computing <\/em>explains in \u201cA Small Business Guide to Mobile Device Management<\/a>,\u201d once a device is connected to MDM software, you can enforce your company\u2019s security and compliance policies, grant or deny access to company data, and automate the distribution and\/or updates of apps and security tools. It also lets you wipe data off a device that has been stolen or lost or belongs to an employee who has left the company.<\/p>\n In the Apple iPhone situation had MDM software been installed on the phone, it would have allowed the San Bernardino County IT department, who owned the phone, to unlock it and unscramble data, reports Reuters<\/a>. While the situation that unfolded in San Bernardino is unlikely to happen at your small business, there is a need to protect corporate data. Frost & Sullivan reports<\/a> that the proliferation of mobile devices provides cyber criminals with yet another often unprotected entry point to launch an attack. In 2014, 60% <\/a>of targeted cyberattacks were aimed at small business, according to Symantec.<\/p>\n However,\u00a0 a survey<\/a> conducted by Spiceworks a few years ago found that only 37% of small and midsize businesses were planning or planned to manage mobile devices using an MDM offering. Reasons for not deploying MDM included: security threat not perceived big enough to warrant the investment (49%); lack knowledge to proceed with the implementation (36%) and budgetary concerns (34%).<\/p>\n MDM offers a range of benefits<\/strong><\/p>\n A survey<\/a> from CDW in 2012 on small business mobility indicated that IT managers who deployed MDM technology reported that it gave them a \u201cbetter grip on mobile devices and applications\u201d to improve security (53 %), but that\u2019s not all. Other benefits cited were:<\/p>\n How to choose an MDM solution<\/strong><\/p>\n There are a host of MDM suite vendors to choose from. Here are questions Spiceworks recommends<\/a> you ask:<\/p>\n Mobile technology has changed the business landscape. MDM software can make it easier to manage how employees are using devices and apps to protect your company and your customers.<\/p>\n","protected":false},"excerpt":{"rendered":" The debate that has emerged over the Government’s request for […]<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":[],"categories":[510],"tags":[695,781,929,637],"_links":{"self":[{"href":"https:\/\/blogs.poly.com\/wp-json\/wp\/v2\/posts\/2682"}],"collection":[{"href":"https:\/\/blogs.poly.com\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/blogs.poly.com\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/blogs.poly.com\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/blogs.poly.com\/wp-json\/wp\/v2\/comments?post=2682"}],"version-history":[{"count":0,"href":"https:\/\/blogs.poly.com\/wp-json\/wp\/v2\/posts\/2682\/revisions"}],"wp:attachment":[{"href":"https:\/\/blogs.poly.com\/wp-json\/wp\/v2\/media?parent=2682"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/blogs.poly.com\/wp-json\/wp\/v2\/categories?post=2682"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/blogs.poly.com\/wp-json\/wp\/v2\/tags?post=2682"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}<\/a><\/p>\n
\n
\n