• Register

Data Net Blog

Tip of the Week: How to Differentiate Work and Personal Accounts on Android

Tip of the Week: How to Differentiate Work and Personal Accounts on Android

With Bring Your Own Device solutions becoming more popular, you want to be completely sure that your data is safe while also ensuring that you aren’t interfering with your employees’ personal use of their devices. This week, our tip will cover how you can do so with the help of Android’s work profiles feature.

First, let’s review the balance between personal devices and work purposes.

Mobile devices have been welcomed in the workplace since their introduction, with many companies providing devices to their employees to use as remote work became more practicable. With the introduction of smartphones, the opportunity to effectively work remotely became even more apparent. This opportunity saw pretty extreme growth, as the Pew Research Center conducted a smartphone ownership survey in 2011 to chart smartphone ownership among adults in the United States, concluding that only 35 percent of adults personally owned a smartphone. 

Now, that statistic has swelled to around 81 percent, and many users are reluctant to carry a second mobile device for work.

Combining that figure with another survey’s conclusion--that 70 percent of employees keep their mobile devices in sight while in the workplace--it seems odd that more businesses haven’t embraced the idea of BYOD strategies. Admittedly, 59 percent of businesses allow the use of personal devices for work purposes, but when considered alongside the other stats we’ve covered here, 59 percent seems low.

This disparity can be chalked up to a difference of opinion coming from either side of the issue: Employees don’t want to sacrifice any of the freedoms that their personal devices offer, and employers don’t want to compromise the security of their data.

How Android Resolves this with Work Profiles

Unbeknownst to many businesses and employees, work profiles were added to the Android platform with 7.0 Nougat. These work profiles allow for the complete segregation of their own data from that of their workplace...going so far as to install a second instance of a given application, branded with a special icon to differentiate between the personal-use app and the workplace-app.

Of course, as secure as these work profiles are, some of the same BYOD obstacles can still impact them as they would any other approach. The fact of the matter is that many employees just aren’t comfortable with the idea of handing over access to their device to the boss (despite having no problem in handing over similar permissions to application developers).

However, if you can work past this skepticism with your team, there are many benefits to utilizing work profiles, including increased productivity and reinforced security.

Setting Up Work Profiles

In order to install a work profile-enabled application, you will have to use Google Mobile Management for Android, as well as have Android 5.1 (or newer) installed. The applications that should be installed will also need to be whitelisted in the managed Play Store.

In Settings, locate Management, then access Devices and Search and select devices. Here, the Managed Google Play store will allow you to open a work profile installation wizard. Select Create managed Google account/work profile, and confirm your selection via Create.

Data Net is committed to helping businesses succeed, whether it’s through simple tips like this or complete managed services. Learn more about what we offer by calling us at (760) 466-1200.

Shadow IT Is a Problem, or Is It?
How a Firewall Helps Protect Your Systems


No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Friday, February 28, 2020

Captcha Image

Tag Cloud

Tip of the Week Security Technology Best Practices Business Computing Network Security Productivity Privacy Data Efficiency Smartphones Malware Hackers Google Innovation IT Support Microsoft User Tips Communication Email Managed IT Services Software Computer Tech Term Communications Small Business Hardware VoIp Android Internet Users Mobile Device Cybersecurity Workplace Tips Mobile Devices Business Management Cloud Outsourced IT Windows 10 Miscellaneous Ransomware Passwords Collaboration IT Services Social Media Business Cloud Computing Apps Data Backup Hosted Solutions Network Wi-Fi Browser Applications Managed Service Windows Backup Upgrade Gadgets Bandwidth Holiday Smartphone Information Internet of Things Data recovery Facebook Chrome Employer-Employee Relationship Networking Gmail Microsoft Office Marketing Wireless VPN Patch Management Managed IT services Phishing Blockchain Access Control Automation Apple Compliance Save Money Word Laptop Router BDR Value Saving Money Managed IT Service Business Intelligence Quick Tips Company Culture Windows 7 Data Protection Settings Scam Data Breach Telephony Voice over Internet Protocol Business Continuity Artificial Intelligence Payment Cards Password Business Technology iPhone Social Network G Suite Remote Monitoring Cortana Healthcare Going Green Paperless Office How To Processor Bring Your Own Device Virus Net Neutrality RAM Wireless Charging Remote Monitoring and Management Government Remote Computing Retail Data Security Data Management Telephone System Physical Security Mobility Office Virtual Assistant Medical IT Virtualization Batteries Tech Terms Cost Management Office 365 Excel Computers Employee-Employer Relationship Connectivity Help Desk National Security Big Data Technology Tips IT Service Server Paper Search Database Mobile Device Management Edge Touchscreen Hosted Desktop Tablet E-Commerce Bitcoin Network Attached Storage Environment Video Movies User Security Security Cameras Risk Management IT budget Eliminating Downtime Twitter WannaCry Electronic Health Records Vendor HP GDPR Spam Managed Service Provider Managing Stress Mobile Comparison Congratulations Time Management Ink Insurance Cybercrime Workers Customer Service Holidays Microsoft Office 365 Dongle Firewall Travel Payment Maintenance Plug-In e-waste Tip of the week Botnet Voice over IP Wearables BYOD Inventory HIPAA Health Streaming Media Document Management Storage Antivirus Co-Managed IT Website Updates Troubleshooting Backup and Disaster Recovery Specifications WhatsApp Chrome OS PowerPoint File Management Machine Learning Tactics File Sharing Millennials OneNote Unified Communications Authentication Profiles Knowledge Battery Education instant Messaging Internet Explorer Threats Proactive IT disposal Licensing IT Management Wireless Internet Mobile Security Hard Drive News Employees Downloads Distribution Dark Web Staff Humor Certification Update Hard Drives Conferencing Lead Generation Sports Current Events Reporting Windows Server 2008 R2 Analytics Authorization Shadow IT Live Streaming Vulnerabilities Threat Scams Server Management Memes eCommerce Tech Support Recycling Amazon Operating System Processors Solid State Drive Trends Fleet Management Digital Error Websites Display Hybrid Cloud Outlook SSD Human Resources Mobile Office Telecommute Virtual Private Network Taskbar Microsoft Teams Computer Repair Cryptocurrency Printing Project Management Law Enforcement Telecommuting Remote Support Safety IT Sales Online Shopping Alert Vulnerability Personal Information User Tip Spyware Cleaning Hard Disk Drive A.I. Multi-Factor Authentication Training Benchmarks Cables Profitability Content Filtering Managed Services Provider SaaS Data loss Customer Relationship Management Disaster Recovery Thank You Printers Financial Regulation WiFi Analysis

Latest News & Events

Please join us in congratulating Bill Vann on his promotion to Customer Success Manager....

Contact Us

Learn more about what Data Net can do for your business.

Call Us Today
Call us today
(760) 466-1200

5795 Kearny Villa Road
San Diego, California 92123