croom new

Patriot Tech Services Inc. Blog

Smartphones Have New Roles in Business

Smartphones Have New Roles in Business

No doubt you’ve noticed the increased use of smartphones. No matter where you go, people are on their phones. Sometimes they are using them in places you wouldn’t even imagine. For the modern business, employee smartphone usage can be a major pain in the side. Today, we’ll go into how smartphone usage helps and hurts a business and how to go about keeping employees from being on their phones for large chunks of the workday.

Smartphones in the Workplace

Why don’t we start with the truth. Yes, smartphones are a distraction and largely a hindrance to productivity. Some businesses deal with it more than others, but a study conducted suggests that employees spend an average of 56 minutes per day on their phones. Since for the full-time worker that works out to about 1/8th of the time, that means that productivity is at least 10 percent lower than it should be. Until you factor in the other way that smartphones affect an employee’s performance. 

Businesses today want their staff to be available more than ever. You don’t punch a clock anymore, you use software to track your time, so when a work-related issue comes up in non-work hours, waiting for the answer can make a big difference. The modern employer takes advantage of their staff’s reliance on their personal devices by effectively extending access to their knowledge around the clock (more about this later).

With a chunk of the day being spent on their phones, the modern worker has to know that this behavior isn’t in the best interests of the organization. Conversely, management has to know that their staff can’t possibly care less about their concern. They get their salary--or more frequently their hourly wage--to come to work and do a job. They need to have a life outside of work, after all. 

With this thought in mind is where companies start to go wrong. Managers realize that it is much costlier to onboard new people who don’t use smartphones, or who are less willing to do so, so they create archaic and completely unrealistic policies and are left scratching their heads when even their best performers don’t comply with the policy. 

The truth is that since people are going to use their phones, making them understand where you stand on the issue is the best policy. You have to make it clear that you understand that people have hobbies and families and all the other things that have people spending all that time at work; and, ask them to respect the organization. In doing so you set a very solid guideline to what facilitates wasting time on phones that people will do their job and use their phones more sparingly.

The fact is that trying to control an uncontrollable situation will leave you tearing your hair out and should be avoided if possible.

Smartphones Out of the Workplace

Outside of work is where the business can make up some of that ten percent. Since it’s obvious that everyone uses their phones inside your office (where it is taboo), it stands to reason that they will be constantly using their phones outside of the office. For the most part, this is true. Studies routinely show that people use their phones between three and four hours per day on average. That means that the average person is on their phone for over three hours per day outside the office. At first glance, this seems like a ridiculously high number, but when you begin to think about it, the smartphone is a major part of so many people’s lives that four hours per day seems about right. How long do you last without checking yours?

This opens up opportunities that haven’t traditionally been there to engage with your workers outside of the office. Not only are they more apt to check their company-provided accounts (email, voicemail, instant messaging), if you were to contact with a pressing issue, there is a much better chance than ever before that the person will engage with work-related questions in their off-time. This constant availability can have a lot of benefits for your business.

What About Security?

So, with a majority of the worlds computing being done on devices that can fit in the palm of a hand, of course there would be a campaign by hackers to take advantage of this computing shift. Today there are mobile malware strains that, if they were to get onto an enterprise network, and get past their security, it could cause some serious damage to a business. 

To avoid these circumstances, businesses need to enact a Bring Your Own Device (BYOD) policy that uses cutting-edge mobile device management tools to administer all smartphones and other devices on the network. Your staff may deride the decisions to implement this system at first, but if their two options are using their service plan data or using your wireless network, most of them will absolutely opt in.

For more information about implementing a comprehensive BYOD policy for your organization, and what technologies you need to take advantage of increased smartphone utilization, contact the IT professionals at Patriot Tech Services Inc. today at 877-874-4629.

Instant Messaging Tips for Greater Productivity
SQL Server 2008 and 2008 R2 is Done For
 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Saturday, August 24 2019
If you'd like to register, please fill in the username, password and name fields.

Captcha Image

Mobile? Grab this Article!

Qr Code

Tag Cloud

Tip of the Week Security Technology Best Practices Privacy Network Security Internet Productivity Hackers Google Cloud Business Computing Innovation User Tips Microsoft Software Computer Efficiency Tech Term Data Business Management Malware Mobile Devices Smartphones Hardware Workplace Tips Data Backup Upgrade Smartphone Browser Hosted Solutions Email Windows 10 Office 365 Apps Windows 10 Internet of Things Data Recovery Small Business Backup communications Communication Business IT Services Mobile Device Management Miscellaneous Data Security Android Cybersecurity Windows IT Support Gadgets Best Practice Outsourced IT Network VoIP Business Continuity Passwords Productivity Spam Holiday Server Artificial Intelligence Automation Operating System Disaster Recovery Health Information Cybercrime Users Employer-Employee Relationship Blockchain Virtualization Ransomware Social Media Gmail Managed Service Managed Service Provider Two-factor Authentication Networking OneNote Office Saving Money Phishing Alert Law Enforcement Cost Management Tech Support Government Collaboration Chrome Money Wireless Hacking Google Drive Microsoft Office Data Management Bring Your Own Device Budget Word Applications Facebook Remote Computing Vulnerability User Error Bandwidth Managed IT Services Update Cloud Computing Computers Google Assistant Safety Social Engineering Going Green Business Technology iPhone Apple Save Money Fraud Password Streaming Media File Sharing Information Technology Mobile Device Wireless Charging Recovery Travel Telephone Systems VPN Application Social Conferencing Search Retail Personal Information Office Tips Politics App Cortana Data Breach DDoS Encryption Access Control Quick Tips Sports Financial Proactive IT Data Loss Risk Management Evernote Marketing Project Management Devices Managed IT Services Google Docs Telephony Router eWaste Printing Wireless Technology Human Resources Mobile Security Wi-Fi Meetings Hybrid Cloud The Internet of Things Windows 7 BYOD Firewall Saving Time Paperless Office Commerce Benefits Charger PDF Bloatware Payroll Robot Excel Sales Identity Entertainment Accessory Patch Management Amazon Legal Scam Employees Display Mobile Office Microsoft Word Gamification Hacker Customer Relationship Management Employee Google Maps Touchpad Websites Testing Smartwatch Branding Value Humor Emergency Lithium-ion battery Security Cameras Audit Identities Software as a Service Data Privacy Peripheral Chromecast Edge Virtual Assistant Education OneDrive Data Theft Business Intelligence Reputation Identity Theft Co-Managed Services Development Touchscreen Disaster Maintenance Memory Break/Fix Augmented Reality Operating Sysytem IT solutions Camera Server Maintenance Internet Exlporer IT Support Machine Learning Tablets Data storage Language Antivirus Hosted Solution Gifts Hard Drive Wearable Technology Administrator Ciminal Alexa for Business Storage Voice over Internet Protocol Remote Monitoring Legislation Computing Mobile Computing Telephone Micrsosoft Data Protection Device Security Medical IT Avoiding Downtime Projects Investment Computer Forensics Downtime WannaCry NFL Distributed Denial of Service Instant Messaging Credit Cards Chromebook Admin Running Cable Access BDR WiFi Vendor Sabotage Comparison App store Biometrics Customer Service Hyperlink Digital Signage IT Management Teamwork 5G Trending History ROI SaaS Bluetooth Workers Management E-Commerce Virus PowerPoint Managed IT FAQ Keyboard Shortcuts Transportation IT budget Vendor Management Employee-Employer Relationship PC Specifications Wasting Time Processor Files Spyware Shortcut YouTube Microsoft Excel Private Cloud Battery Windows Server 2008 R2 Fax Server Uninterrupted Power Supply Updates Wireless Internet Mobility Payment Cards Windows Ink Television Laptop Proactive iOS Licensing Regulation Samsung Windows 10s Settings Point of Sale Consultant Unified Threat Management HaaS Computer Accessories Root Cause Analysis Congratulations Text Messaging Big Data Black Market Training Experience Best Available Solid State Drive Outlook Tablet WIndows 7 Flexibility Employer Employee Relationship Cache Hard Drives HBO Administration IT consulting Keyboard Mouse Data Storage Twitter Cleaning Computer Fan Company Culture intranet Music Virtual Reality Hard Disk Drive Sync Cameras Managing Stress Scalability Worker Commute Analytics Emails SharePoint Regulations Hiring/Firing CrashOverride Automobile Screen Mirroring Worker End of Support Books Printer How To Computer Care Work/Life Balance Webinar Smart Technology Network Congestion Science Printers Cast Monitors USB Unsupported Software Advertising Electronic Medical Records Adobe Printer Server Compliance Phone System Current Events Near Field Communication Relocation User IT solutions WIndows Server 2008 Video Games Upgrades Save Time Nanotechnology Thank You Presentation

Sign Up For Our Newsletter

  • First Name *
  • Last Name *

      Latest Blog Entry

      When you are in the market for some new computers for your business, ensuring that you are targeting the right hardware is important. To educate people on what they should be looking for in a new computer, we have decided to put together a multi-part series detailing the dif...

      Latest News

      Patriot Tech Services Inc. launches new website!

      Patriot Tech Services Inc. is proud to announce the launch of our new website at www.patriot-techs.com. The goal of the new website is to make it easier for our existing clients to submit and manage support requests, and provide more information about our services for prospective clients.

      Read more ...

      Account login