• Jump to contents
  • Jump to main navigation
  • Jump to site map
  • News
  • Insight
  • Careers
  • Support
  • Book a Meeting
  • Contact Us Now
  • Book a Meeting
  • Contact Us Now
  • +44 207 837 2444
  • US and International: +1 323 984 8908
  • Change Region
  • +1 323 984 8908
  • Change Region

Cardonet IT Support for Business

Cardonet are a consultative business partner who will work closely with you to provide a transparent, vendor-neutral approach to your IT Services.

+44 203 034 2244
7 Stean Street, London, E8 4ED

+1 323 984 8908
750 N. San Vicente Blvd, Los Angeles, CA 90069

  • Home
  • IT Solutions
    • Industry Sector IT Solutions
      • Hospitality
        • Hotels
        • Hotel Management
        • Restaurants
        • Pub & Bars
      • Finance Associations
      • Manufacturing
      • Media and Creative
        • Marketing Agencies
        • Public Relations and Communications Agencies
        • Design Agencies
        • Advertising Agencies
        • Market Research Agencies
        • Entertainment
      • Charity
      • Education
    • Business IT Challenges
      • Remote and Hybrid Working
      • IT Outsourcing
      • IT Cost Optimisation
      • Office Move and IT Relocation
      • Global Technology Operations
      • Global IT Helpdesk
      • Cyber Security Journey
      • Technology Compliance
      • Multi-site IT Operations
      • GDPR Compliance
      • PCI DSS Compliance
  • IT Services
    • IT Support
      • 24x7 Service Desk
      • 24x7 Network Monitoring
      • IT Service Delivery
      • Proactive IT Support
      • Remote IT Support
      • Onsite IT Support
      • Out of Hours IT Support
      • Dedicated Service Desk
      • Network Support
      • Microsoft Support
      • Apple Mac Support
      • Business IT Support
    • IT Consultancy
      • IT Strategy
      • IT Projects
      • IT Audits
      • Software Licensing
      • IT Infrastructure
      • IT Procurement
      • IT Supplier Management
      • IT Security
      • IT Networks and Cabling
      • Cloud Readiness
      • Virtualisation
      • Backup and Continuity
    • Managed IT
      • Managed Networks
      • Managed Hosting
      • Managed Backups
      • Business Continuity
    • Managed Cloud
      • Private Cloud
      • Hybrid Cloud
      • Public Cloud
    • Communication
      • Onsite Telephone System
      • Hybrid Telephone System
      • Cloud Telephone System
      • Contact Centre
      • Video Conferencing
      • SIP Trunking
      • Lines and Calls
    • Cyber Security
      • Cyber Security Audit
      • Managed Cyber Security
      • Cyber Compliance
  • About
    • About Cardonet
      • Why Cardonet?
      • News
      • Insight
      • Management Team
      • Case Studies
      • Customers
      • Technology Partners
      • Accreditations & Memberships
      • Approach and Culture
      • History
    • Careers with Cardonet
      • Why Cardonet for your Career?
      • Meet our Team
      • Job Entry Options
      • Current Job Vacancies
  • Contact

News

Mobile Device Management Strategy: The Trust Gap 

by Viki Asimov / Wednesday, 11 March 2026 / Published in Managed IT
mobile device management byod vs cope

The Mobile Ecosystem 

A mobile policy cannot exist in a vacuum. One of the most common mistakes businesses make is treating mobile phones as accessories rather than as endpoints. 

The smartphone is now the “master key” to your entire digital estate. It is the device that approves Multi-Factor Authentication (MFA) requests. It is the device that receives the password reset code. It is the only piece of technology that is always on, always connected, and always with the user – whether they are at a desk, in a taxi, or at home. 

This constant presence creates a specific conflict: 

  • The Benefit: It is the perfect identity anchor. Because it is always present, it verifies who is accessing your systems more reliably than a password ever could. 
  • The Risk: If that “master key” is compromised – or if it is an unmanaged personal device running an outdated OS – it bypasses your firewall entirely. 

A robust IT strategy treats the mobile phone exactly like a laptop or a server: it is just another window into your data. It must be part and parcel of your overall security plan and broader technology strategy, governed by the same rules, protected by the same identity, and supported by the same team. 

  • Unified Identity: Whether a user logs in from a hotel front desk PC or a creative director’s iPad, the identity (using tools like Microsoft Entra ID) must be the single source of truth. If you disable their account, it should kill access everywhere – instantly. 
  • Unified Management: Tools like Microsoft Intune (for general operations) and Jamf and Addigy (for Apple-heavy creative teams) allow Cardonet to push updates, enforce encryption, and wipe data remotely. This only works reliably if the device is enrolled and managed correctly. 
  • Unified Support: Technology locks the door, but Support gives the right people the key. The reason COPE (Corporate Owned, Personally Enabled) fails in other businesses is that nobody answers the phone at 11 PM when a General Manager is locked out of their new iPhone. A 24/7 Service Desk removes the friction so the security can remain. 
mobile device management master key

When the phone is not yours 

A duty manager leaves a phone on a linen trolley during a busy checkout shift. A creative director leaves a prototype design on the train after a client pitch. 

In these moments, the technical details of your mobile policy stop mattering. The only thing that matters is ownership. 

If the device belongs to the individual, the business is paralysed. You are negotiating for the return of your own data. You are relying on the goodwill of someone who may be stressed, leaving the company, or simply careless. 

January makes this volatility visible. New devices from Christmas replace old ones, breaking audit trails. Recruitment spikes across both hospitality and media sectors. Staff leave. Data moves. 

Autonomy is a privilege. Security is a fiduciary duty. 

The choice is stark: rent access to your own intellectual property through BYOD (Bring Your Own Device), or own the environment through COPE (Corporate Owned, Personally Enabled). 

BYOD is often a Trojan Horse – invited in for convenience, but carrying hidden risks. 

mobile device management trust gap

Two Worlds, One Problem 

While the risk is universal, the context changes depending on whether you are running a hotel in Mayfair or a creative agency in Soho. 

In Hospitality: Speed vs. Privacy 

For a hotel, the mobile device is an operational tool. It is a housekeeping checklist, a maintenance log, and increasingly, a VIP guest profile. The risk here is Reputation. Seasonal staff and shift-based roles mean devices change hands rapidly. If a duty manager uses a personal phone for WhatsApp groups discussing guest requirements, that data leaves the building the moment their shift ends. A leaked VIP guest list isn’t just a GDPR breach; it is a PR crisis that ends up in the national press. 

In Creative: Friction vs. Control 

For a design studio, the mobile device is a lifeline. It holds rush edits, unreleased campaign assets, and high-value client contacts. The risk here is Intellectual Property. Creative teams often reject corporate IT because it feels “clunky.” They use personal devices to bypass file transfer limits or strict firewalls. When they leave, they take the “Shadow IT” ecosystem – and your IP – with them. 

The common failure in both sectors is the belief that you can secure the data without owning the device. You cannot. 

The Fragmentation Tax 

BYOD starts as a financial shortcut. It ends as an operational tax. 

When you allow personal devices, you accept a landscape of chaos: three generations of iPhones, cheap Android handsets that stopped receiving security updates in 2024, and a dozen different operating systems. 

You cannot secure what you cannot standardise. 

The National Cyber Security Centre warns that without ownership, technical controls are legally and practically limited. You are building a castle on someone else’s land. 

There is also the “fragmentation tax” – the hidden cost of IT support trying to troubleshoot an app issue on a device they have never seen. It isn’t a saving. It’s a deferral of cost that you pay with interest later. 

The Undignified Exit 

Even the best ecosystem cannot solve a human problem if the ownership model is wrong. Nowhere is this clearer than the day an employee leaves. 

In a corporate-owned environment, the exit is transactional. Hand over the laptop. Hand over the pass. Hand over the phone. Shake hands. Done. 

In a BYOD environment, it is personal. 
“Please can you show me that you’ve deleted the guest list?” 
“Can we check your photos to make sure there are no unreleased designs?” 

It is undignified for the employee and dangerous for the employer. You are asking for permission to protect your business. 

The UK’s regulatory landscape is tightening here. The Data (Use and Access) Act 2025 places stricter obligations on data governance. Telling a regulator “we asked them to delete it” is not a defense. It is an admission of failure. 

The Mature Move: COPE 

The adult solution is COPE: Corporate Owned, Personally Enabled. 

The business buys the phone. The business owns the phone. But the human element is respected. 

  • For the Hotelier: It means the device is rugged enough for a shift but smart enough for management apps, and it stays on the property (or is managed) when the staff member moves on. 
  • For the Creative: It means providing a high-spec iPhone 16 or 17 that integrates perfectly with their MacBook, so they don’t feel the need to use their personal device to get work done. 

The ICO’s encryption guidance makes it clear: encryption is a standard expectation. COPE makes encryption the default state, not a user choice. 

Why This Matters: Valuation 

Valuation is not just about revenue. It is about the security of your assets. 

A hotel’s asset is its guest trust. A creative agency’s asset is its IP. 

If your VIP list walks out the door on a personal Samsung Galaxy, or your campaign strategy leaves on a personal iPad, your valuation walks with it. Investors look for “Governance.” They look for control. 

A fleet of unmanaged personal devices signals a business that is still operating in “start-up mode” – improvising security rather than architecting it. 

Protecting Your Business: Next Steps 

Stop renting your security. 

  1. Inventory immediately. You cannot protect what you cannot see. For a hotel, this means physically checking the front desk drawer for “shared” handsets; for an agency, it means auditing your cloud access logs to see which personal devices are syncing data. 
  1. Test the Offboarding. Run a tabletop exercise: a senior partner or key manager leaves tomorrow and refuses to cooperate. Can you wipe their access? If the answer is “no,” you have a crisis waiting to happen. 
  1. Integrate the Lifecycle. Don’t just buy phones. Plan the lifecycle. Who configures them? Who supports them? Who wipes them? 

Cardonet manages the entire employee technology lifecycle. From the moment a device is unboxed to the moment it is wiped and re-issued, we handle the logistics so you don’t have to negotiate with leavers. 

Schedule a Mobile Security Policy Review to move from “hope” to “control.” 

FAQs 

mobile device management faq

Isn’t BYOD cheaper? 

Only if you look at the hardware cost in isolation. The “fragmentation tax” – the cost of supporting inconsistent personal devices and the risk of a single data breach – often exceeds the cost of providing standardised hardware. 

Does this mean we need two different policies for our different teams? 

Likely, yes. A housekeeping team might need shared, lockdown devices (COBO – Corporate Owned, Business Only), while your marketing team needs high-freedom iPhones (COPE). A good MSP manages both policies under one roof. 

How does this fit with our current IT support? 

Mobile management should not be a separate “project.” It should be part of your monthly managed service. If you are already paying for Microsoft 365 or Apple Business Manager, you likely have the licences for this already. You just need the strategy to deploy it. 

Can we legally wipe a personal phone? 

Technically, yes. Legally and culturally, it is a minefield. Wiping a personal phone means deleting baby photos to remove one email. Ownership solves the legal ambiguity. 

What is the first step? 

Audit. Do not buy hardware yet. Find out where your data lives. Most leaders are terrified when they see the list of active devices attached to their Microsoft 365 tenancy. Start there. 


Beyond the Device: The Cardonet Partnership 

Mobile security is a critical starting point, but it is just one layer of a resilient business. At Cardonet, we view your technology as an interconnected ecosystem where 24/7 Support, Cloud Infrastructure, and Cyber Security work in unison. Whether you need to secure your Mac environments in a creative studio or ensure PCI compliance across a hotel group, our role is to remove the complexity of IT management so you can focus on your guests and your clients. We don’t just fix phones; we build the infrastructure that allows your business to scale securely. 

Share this on:

  • LinkedIn
  • Twitter
  • Facebook
Tagged under: Bring your own Device, BYOD, COPE, Corporate Owned Personally Enabled, Cyber Security, Mobile Device Management

About Viki Asimov

What you can read next

Windows 10 End of Support More Downtime
Windows 10 Has Reached End of Support…Expect More Downtime 
Why your business needs to outsource IT Support and Services.
Outsourcing IT Support and Why Your Business Needs This Service
Discussing the importance of cybersecurity for hotel operators.
Hotel Cybersecurity: Are you prepared?

You must be logged in to post a comment.

Featured Posts

  • biggest risk microsoft 365 copilot

    Your Company’s Biggest AI Risk Isn’t Security. It’s Preparation.

  • creative agency technology change management

    The small IT change that breaks a creative agency 

  • reliable-it-support protects creative agency margin

    How reliable IT protects creative agency margin 

  • restaurant it support high turnover teams

    Restaurant IT Support for High Turnover Teams 

Archives

  • April 2026
  • March 2026
  • February 2026
  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • April 2025
  • June 2024
  • April 2024
  • February 2024
  • January 2024
  • October 2023
  • September 2023
  • March 2023
  • February 2023
  • January 2023
  • December 2022
  • November 2022
  • October 2022
  • September 2022
  • August 2022
  • July 2022
  • June 2022
  • May 2022
  • April 2022
  • March 2022
  • February 2022
  • January 2022
  • December 2021
  • November 2021
  • October 2021
  • September 2021
  • August 2021
  • July 2021
  • June 2021
  • May 2021
  • April 2021
  • March 2021
  • February 2021
  • January 2021
  • December 2020
  • November 2020
  • October 2020
  • September 2020
  • August 2020
  • July 2020
  • June 2020
  • May 2020
  • April 2020
  • March 2020
  • February 2020
  • January 2020
  • November 2019
  • October 2019
  • September 2019
  • August 2019
  • July 2019
  • June 2019
  • May 2019
  • April 2019
  • March 2019
  • February 2019
  • January 2019
  • December 2018
  • November 2018
  • October 2018
  • September 2018
  • August 2018
  • July 2018
  • June 2018
  • May 2018
  • March 2018
  • February 2018
  • January 2018
  • December 2017
  • November 2017
  • October 2017

Categories

  • Artificial Intelligence
  • Bam's Blog
  • Customers
  • Cyber Security
  • Events
  • GDPR
  • Guidance
  • IT Consultancy
  • IT Support
  • Managed IT
  • Press Release
  • Recruitment
  • Team
  • Uncategorised
  • USA
  • What is

Tags

Business Business Continuity Christmas Christmas Party Cloud Computing Cloud Hosting Compliance coronavirus Covid 19 Cyber Awareness cyber crime Cyber Risk Cyber Security Cyber Threat Data Backups Disaster Recovery GDPR Halloween HOSPACE Hospitality Hotel Hotel IT Services Hotel IT Solutions Hotel IT Support Hotels Hotel Technology IT infrastructure IT Services IT Support Microsoft Microsoft365 Migration Network Security Outsourced IT Support Pancake Remote Working Security Software Team Team Event Windows 10 Windows 10 End of Life Windows 10 Upgrade Windows 11 Windows 11 Upgrade

Cardonet Twitter

Could not authenticate you.
TOP

We will help you overcome your technology challenges

Call us on +1 323 984 8908, email us at or fill out the following form to start the conversation.

",

For further information on how we process your data, please refer to our Privacy Policy.

IT Solutions

  • IT Solutions by Industry
  • Business IT Challenges

IT Services

  • IT Support
  • IT Consultancy
  • Managed IT
  • Managed Cloud
  • Communication
  • Cyber Security

About

  • Why Cardonet
  • Meet our Team
  • News
  • Insight
  • Case Studies
  • Careers

Contact

  • +44 207 837 2444
  • +1 323 984 8908
  • Change Region
Cardonet 26 years proudly supporting our customer
  •  
  •  
  • 750 N. San Vicente Blvd, Los Angeles, CA 90069
Cardonet IT Support and IT Services
Change Region
  • United Kingdom and Europe
  • United States and International

© 1999 - 2023 All rights reserved.

  • Sitemap
  • Terms and Conditions
  • Privacy Policy
  • GDPR
  • Accessibility Statement
  • Corporate Social Responsibility
  • Environmental Policy
Contact TOP
Cardonet
Cardonet Consultancy Limited 7 Stean Street London, Greater London E8 4ED
London Map +442030342244
Cardonet US Inc 750 N. San Vicente Blvd, West Hollywood Los Angeles, California 90069
Los Angeles Map +13239848908
Home Cardonet IT Support Logo