Five years ago, we were talking about rogue end users who set up their corporate email accounts on personal devices. Now rebellious users with iPhones and Android devices are mainstream. Since then, IT departments have accepted the inevitability of staff using their personal phones and tablets for work, and CIOs are seeing the benefits of workers who are accessible outside of the office. The conversation has shifted towards how to create a secure environment for data sharing on mobile devices, rather than preventing it in the first place.
So what’s your strategy to allow people to transport the data they need on the devices they need? The hallmark of a solid enterprise device management policy hinges on a careful mix of security and flexibility for end users to choose the platform and device that works for them. With careful management, there’s no reason it can’t be a win-win situation.
When iPads came out, we gave 20 to our clinical champions, along with access to the EHR repository via Citrix. This was so successful that we got 'love e-mails'; because we knew this was going to be a real game-changer, we began developing a front-end viewer app for the iPad to pull together PACS images, EHR records and scanned documents.
The cornerstone of a BYOD policy is a security practice that keeps the good guys in and the bad guys out.
Extend corporate network access to employees away from their desks — workers roaming within the office, teleworking from home or traveling on the road – and improve productivity and collaboration.
Wireless voice and data solutions to extend the reach of your network and provide your staff with more access and flexibility than ever before.
Before you make any major changes to your IT policies, make sure you know what your infrastructure can handle and what upgrades might be needed.