Much has been written about security and other headaches that employee-owned devices can cause for IT departments. Much of this hand-wringing is arguably overblown given all the products, technologies, and established best practices available to mitigate risk. Nonetheless, dealing with a wide variety of client hardware over which they have little control requires at least some level of planning and work for IT professionals.
The justification for this effort? Sometimes it's framed with productivity metrics. But, really, the usual justification is that it's happening with or without IT's acquiescence and participation. The storyline then continues on about … Read more