Alltech IT Solutions Blog

Tip of the Week: How to Differentiate Work and Personal Accounts on Android

Tip of the Week: How to Differentiate Work and Personal Accounts on Android

With Bring Your Own Device solutions becoming more popular, you want to be completely sure that your data is safe while also ensuring that you aren’t interfering with your employees’ personal use of their devices. This week, our tip will cover how you can do so with the help of Android’s work profiles feature.

First, let’s review the balance between personal devices and work purposes.

Mobile devices have been welcomed in the workplace since their introduction, with many companies providing devices to their employees to use as remote work became more practicable. With the introduction of smartphones, the opportunity to effectively work remotely became even more apparent. This opportunity saw pretty extreme growth, as the Pew Research Center conducted a smartphone ownership survey in 2011 to chart smartphone ownership among adults in the United States, concluding that only 35 percent of adults personally owned a smartphone. 

Now, that statistic has swelled to around 81 percent, and many users are reluctant to carry a second mobile device for work.

Combining that figure with another survey’s conclusion--that 70 percent of employees keep their mobile devices in sight while in the workplace--it seems odd that more businesses haven’t embraced the idea of BYOD strategies. Admittedly, 59 percent of businesses allow the use of personal devices for work purposes, but when considered alongside the other stats we’ve covered here, 59 percent seems low.

This disparity can be chalked up to a difference of opinion coming from either side of the issue: Employees don’t want to sacrifice any of the freedoms that their personal devices offer, and employers don’t want to compromise the security of their data.

How Android Resolves this with Work Profiles

Unbeknownst to many businesses and employees, work profiles were added to the Android platform with 7.0 Nougat. These work profiles allow for the complete segregation of their own data from that of their workplace...going so far as to install a second instance of a given application, branded with a special icon to differentiate between the personal-use app and the workplace-app.

Of course, as secure as these work profiles are, some of the same BYOD obstacles can still impact them as they would any other approach. The fact of the matter is that many employees just aren’t comfortable with the idea of handing over access to their device to the boss (despite having no problem in handing over similar permissions to application developers).

However, if you can work past this skepticism with your team, there are many benefits to utilizing work profiles, including increased productivity and reinforced security.

Setting Up Work Profiles

In order to install a work profile-enabled application, you will have to use Google Mobile Management for Android, as well as have Android 5.1 (or newer) installed. The applications that should be installed will also need to be whitelisted in the managed Play Store.

In Settings, locate Management, then access Devices and Search and select devices. Here, the Managed Google Play store will allow you to open a work profile installation wizard. Select Create managed Google account/work profile, and confirm your selection via Create.

Alltech IT Solutions is committed to helping businesses succeed, whether it’s through simple tips like this or complete managed services. Learn more about what we offer by calling us at 954-628-3770.

Shadow IT Is a Problem, or Is It?
How a Firewall Helps Protect Your Systems
 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Sunday, April 05 2020

Captcha Image

Mobile? Grab this Article!

QR-Code dieser Seite

Tag Cloud

Windows XP Downloads Budget IT Support Autocorrect Small Business DDoS Current Events Remote Monitoring Artificial Intelligence Vendor Management Phone System Server Management Automation How To Value Recovery Managing Stress Hiring/Firing Connectivity Licensing Holiday HIPAA Spam Blocking RAM Live Streaming e-waste Microsoft Office Data Tech Terms Work/Life Balance Mobile Devices Telecommute Authentication Outsourced IT Distribution Windows Server 2008 R2 Information Data Security Telephone System IT Management Cybersecurity Spam Samsung Physical Security Social Media Security Hosted Solution Scam Threat Remote Support Managed Services Provider Knowledge Bitcoin Inventory Conferencing Google Drive Going Green App Dark Web Office 365 Two-factor Authentication Office Battery Cloud Computing Memes Emoji Time Management HP Best Practices Scheduling File Management Dark Data Data Recovery Botnet Computers Tablet Hosted Solutions Webcam Freedom of Information Hard Drive Microsoft Virtual Reality Yahoo Analysis Cloud Bring Your Own Device Shortcut Saving Money Scalability Automobile Plug-In VoIP Twitter Operating System Emergency Holidays Humor Proactive IT Tech Support Applications disposal Comparison Microsoft Teams Phishing Tactics Antivirus Managed IT Services Storage Wireless Internet Authorization Staffing Cortana User Tip Worker File Sharing Streaming Media IT budget Update Thank You Movies Health Telephony Data Backup Hybrid Cloud Gaming Console Passwords Windows 10 BYOD Backup Security Cameras Technology Net Neutrality Cost Management Education Company Culture Managed Service Provider Avoiding Downtime WhatsApp News Hacker IT Risk Management Printing Credit Cards Financial Data Protection Windows Video Games National Security Websites Settings Mobility Travel User Security Workers Unified Threat Management Spotify Website Taskbar eWaste CrashOverride Troubleshooting Analytics Managed IT Service Customer Service Data loss Paper Scams Hard Drives Efficiency Big Data Government Disaster Recovery Laptop Shadow IT Training Regulation Users Browser Employer Employee Relationship Unified Communications Instagram Safety Paperless Office Profitability Chrome IaaS Human Resources Batteries Gmail Video Synergy Copy Recycling Managed Service Money Firewall Personal Information Politics Social Network Wi-Fi Sales Customer Relationship Management Bandwidth Mobile Office Millennials Software Upgrade Windows 7 Word Dongle Gadget VoIp Maintenance Certification Cryptocurrency Hardware Managed IT Online Shopping Apple WiFi G Suite Business Technology Payment Biometrics Privacy Communication Files Internet of Things Edge Payment Cards Employees Benchmarks Alert BDR Sports Display Digital Staff Voice over Internet Protocol Save Money Wireless Charging Mobile Security Productivity Content Filtering Password Ink Malware Outlook Remote Monitoring and Management Tip of the week Marketing Lead Generation Server Error Project Management Hacking Managed IT Services Networking Printer Server Alerts Congratulations Blockchain SSD Patch Management Backup and Disaster Recovery Vendor Email Document Management Specifications Cabling Remote Virtualization Data Breach eCommerce Network Security Environment Television Smartphones Innovation IT Services Apps iPhone Hosted Desktop WannaCry Encryption Multi-Factor Authentication Wearables Co-Managed IT Android Vulnerabilities Spyware Profiles Vulnerability Processors User Tips Facebook Network Attached Storage PowerPoint The Internet of Things Remote Computing Reporting Hard Disk Drive Database Office Tips Business Management Medical IT SaaS Computer Internet Explorer Updates Compliance Touchscreen Printer Employer-Employee Relationship Business Intelligence HaaS Technology Tips Access Employee-Employer Relationship Processor GDPR Chrome OS Retail Information Technology Cybercrime IT Support Tip of the Week Router Cleaning Amazon Virtual Assistant Windows 10 Excel Workplace Tips Search Google Maps Trends Access Control Business Continuity Mobile Communications Business Computing Insurance Solid State Drive Cables instant Messaging Printers Remote Control Ransomware Business Quick Tips Telecommuting Wireless Microsoft Office 365 Internet Virus Leadership Virtual Private Network Hackers VPN Electronic Health Records Mobile Device Management Eliminating Downtime Google Healthcare Mobile Device Law Enforcement Data Management A.I. Machine Learning Multi-Factor Security Miscellaneous Gadgets Entertainment Collaboration OneNote E-Commerce Smart Technology Computer Care Voice over IP Telephone Systems Help Desk Paste Network Fleet Management Email Management Productivity Threats Smartphone Tech Term