Story image

Is BYOD an expensive mistake for your business?

22 Aug 2018

While companies are starting to recognise the need for a mobility solution, there are still many reasons why a bring-your-own-device (BYOD) approach may not be the best approach for the business. Wavelink managing director Ilan Rubin says, “Using BYOD can seem like a simple solution; it lets employees use devices they’re comfortable with and lets businesses avoid investing upfront in devices.

“However, the full implications of letting employees BYOD should be considered, as there may be a better approach depending on the business and the industry.” There are seven reasons why adopting a BYOD policy could be an expensive mistake for businesses: 1. Security

Security is one of the biggest issues with BYOD because of the security risk posed by consumer-grade phones. When staff use these devices to access patient or consumer information, that information can potentially be hacked more easily than with a purpose-built device. 2. Bring your own distraction

There's a risk that encouraging staff to bring in their own devices that are more suited to watching videos, playing games and keeping up-to-date with their digital social lives will mean they will do just that. Consumer devices may reduce productivity, which for most businesses is the strategic goal of implementing a mobility program. 3. Mixing personal and business data

Companies with BYOD risk employees that are leaving the company walking away with a significant amount of client data, available at a touch of the button on their own device if strict policies aren’t in place. On the flipside, employees may also feel their own privacy may be breached by their employer if they are connected to the company network.  4. Ruggedised devices

Unfortunately, there are business environments that consumer-grade technology can’t withstand. If employees are working in areas where they are likely to drop their phone on a concrete floor, or expose the phone to water, dust, strong disinfectants, or if they require a device to monitor temperature in a cold environment like a freezer, they will need special handheld devices designed for these tasks. 5. Vulnerabilities

Employees could be downloading mobile apps and connecting to external Wi-Fi spots without the correct security protocols in place. This creates serious security holes that can be exploited by hackers. Coupled with the fact that employees might not have antivirus protection or have an up-to-date firewall present on their mobile devices, this means they might be more vulnerable to attacks. 6. Device disparities 

With BYOD, employees are likely to have a plethora of devices, all with different capabilities and operating systems that run different programs at different levels of quality. Many companies might not have an IT department resource to ensure all business applications and data workflows work on every different device, which is required for a profitable return on investment.  7. Cost

Having to pay for both the device and the data plans can increase the total cost of ownership for the organisation. Also, trying to implement guidelines and security for the devices can end up costing the organisation more than it originally planned for when it implemented the BYOD system.

Avi Networks: Using visibility to build trust
Visibility, also referred to as observability, is a core tenet of modern application architectures for basic operation, not just for security.
Privacy: The real cost of “free” mobile apps
Sales of location targeted advertising, based on location data provided by apps, is set to reach $30 billion by 2020.
Myth-busting assumptions about identity governance - SailPoint
The identity governance space has evolved and matured over the past 10 years, changing with the world around it.
Forrester names Crowdstrike leader in incident response
The report provides an in-depth evaluation of the top 15 IR service providers across 11 criteria.
Slack doubles down on enterprise key management
EKM adds an extra layer of protection so customers can share conversations, files, and data while still meeting their own risk mitigation requirements.
Security professionals want to return fire – Venafi
Seventy-two percent of professionals surveyed believe nation-states have the right to ‘hack back’ cybercriminals.
Alcatraz AI to replace corporate badges with AI security
The Palo Alto-based startup supposedly leverages facial recognition, 3D sensing, and machine learning to enable secure access control.
Unencrypted Gearbest database leaves over 1.5mil shoppers’ records exposed
Depending on the countries and information requirements, the data could give hackers access to online government portals, banking apps, and health insurance records.