You’ve simply made your fifth rent. Or your tenth. Or your thirtieth. Congratulations! Placing collectively a practical workforce from the bottom up is likely one of the hardest elements of the startup journey.
However someplace between the signed contracts and the Slack invitations, a query arises: “What cellular machine are they going to work on?”
For lots of early-stage startups, the reply is “No matter they’ve already obtained.” BYOD – convey your individual machine – feels just like the lean, scrappy transfer. There’s no upfront capital outlay, no procurement complications, and minimal cellphone setup with no IT help
A rising headcount can change that dynamic. All of a sudden, BYOD begins to hold safety dangers that weren’t as current earlier than. With 82% of organisations permitting some type of BYOD, the dangers of information breaches and assaults by way of unsecured networks begin to enhance with every particular person – and machine – added to the workforce.
Listed here are some issues to consider earlier than you default to BYOD – and some indicators it is likely to be time to vary your strategy.
Why BYOD seems straightforward – and why it normally isn’t
On the floor stage, BYOD is the trail of least resistance. Workers convey cellular gadgets they’re already comfy with. The enterprise saves on {hardware}. IT stays out of it. Everybody’s completely happy.
The issue is that startups not often cease to consider what occurs when – not if – one thing goes improper.
A tool will get misplaced. An worker leaves on dangerous phrases. A buyer’s information finally ends up on a private cellphone that’s now operating on another person’s SIM. None of those are edge circumstances – they occur on a regular basis. However they’re virtually by no means high of thoughts once you’re too involved with hitting the subsequent milestone.
Catherine Yue, head of mobility product at Optus, says that is merely unfeasible for dealing with gadgets over the long run: “Organisations don’t let workers convey their very own laptops, so why settle for the identical unmanaged threat of their pockets?”
It’s a good query. Most startups would baulk on the thought of a brand new rent bringing their five-year-old private laptop computer to work. However they’ll fortunately let the identical particular person leap into Slack, Gmail, Figma, buyer CRMs and delicate investor paperwork on their very own smartphone. The machine is totally different, however the information publicity is precisely the identical.
What ‘good’ machine administration seems like for a rising workforce
You don’t want an enterprise IT division to deal with this effectively. You simply must suppose by way of a couple of fundamentals earlier than you’re in too deep to vary tack.
- Determine what information is definitely delicate: Buyer info, investor paperwork, monetary information, supply code, something lined by privateness legislation. If it’s on a private machine, how is it protected? Are you able to wipe it remotely if somebody loses their cellphone?
- Take into consideration offboarding earlier than onboarding: When an worker leaves, how will you get your information off their machine? If the reply is “We’ll ask properly” that’s not a coverage to stake what you are promoting on.
- Make sure that your IT setup can scale: A founder who manages machine setups for 5 folks can in all probability get away with so much. At 20 folks, it’s a drag. And at 50, it’s a full-time job you don’t have the price range for.
- Construct in visibility: In a BYOD setting, you normally can’t see which gadgets are logging into what. That makes it more durable to reply when one thing does go improper – and more durable to show you’re assembly your compliance obligations when a buyer or investor asks.
The case for managed mobility as you scale
Quickly scaling companies are more and more shifting in the direction of managed mobile fleets as a substitute resolution that may not solely mitigate dangers, however remove hidden prices that include BYOD reimbursement fashions. With much less likelihood of downtime, there’s much less likelihood of wasted productiveness and sources.
As Yue places it, companies already lock down laptops for safety, so why do they overlook mobiles which have entry to the identical techniques?
“In an period of subtle cellular threats and dissolving community perimeters, this blind spot is changing into more and more harmful,” she says.
Optus’ managed mobile device services are an instance of how this could work. A managed fleet provides you pre-configured, business-grade gadgets able to go from the beginning. Safety and compliance insurance policies are utilized throughout the board. If a tool is misplaced or stolen, enterprise information will be remotely wiped with out touching something private.
IT groups (or in a startup’s case, the founder, CTO or ops lead) get one view throughout the entire fleet as an alternative of piecing issues collectively on their very own. For workers, the burden of managing your know-how turns into an entire lot much less heavier – upgrades are performed for you and points are resolved by way of devoted help channels.
There’s additionally the price issue: proactive machine administration reduces downtime and permits IT groups to get on with the job, quite than placing out fires of surprising information breaches.
The timing query
There’s no magic headcount the place BYOD stops working and managed mobility turns into a greater resolution. However there are indicators to be careful for.
In the event you’re spending greater than a few hours every week on machine points, in the event you’ve had a scare involving a misplaced cellphone or a departing worker, or in the event you’re about to shut a cope with an enterprise buyer asking about your safety posture – these are all cues to rethink.
The primary purpose? Don’t over-engineer earlier than you could. As an alternative, be sure all the commonsense stuff is in place earlier than frequent sense is not sufficient.
Learn more about managed mobility to see if it’s proper for what you are promoting.

