Story image

Is BYOD an expensive mistake for your business?

22 Aug 2018

While companies are starting to recognise the need for a mobility solution, there are still many reasons why a bring-your-own-device (BYOD) approach may not be the best approach for the business.

Wavelink managing director Ilan Rubin says, “Using BYOD can seem like a simple solution; it lets employees use devices they’re comfortable with and lets businesses avoid investing upfront in devices.

“However, the full implications of letting employees BYOD should be considered, as there may be a better approach depending on the business and the industry.”

There are seven reasons why adopting a BYOD policy could be an expensive mistake for businesses:

1. Security

Security is one of the biggest issues with BYOD because of the security risk posed by consumer-grade phones. When staff use these devices to access patient or consumer information, that information can potentially be hacked more easily than with a purpose-built device.

2. Bring your own distraction

There's a risk that encouraging staff to bring in their own devices that are more suited to watching videos, playing games and keeping up-to-date with their digital social lives will mean they will do just that. Consumer devices may reduce productivity, which for most businesses is the strategic goal of implementing a mobility program.

3. Mixing personal and business data

Companies with BYOD risk employees that are leaving the company walking away with a significant amount of client data, available at a touch of the button on their own device if strict policies aren’t in place. On the flipside, employees may also feel their own privacy may be breached by their employer if they are connected to the company network. 

4. Ruggedised devices

Unfortunately, there are business environments that consumer-grade technology can’t withstand. If employees are working in areas where they are likely to drop their phone on a concrete floor, or expose the phone to water, dust, strong disinfectants, or if they require a device to monitor temperature in a cold environment like a freezer, they will need special handheld devices designed for these tasks.

5. Vulnerabilities

Employees could be downloading mobile apps and connecting to external Wi-Fi spots without the correct security protocols in place. This creates serious security holes that can be exploited by hackers. Coupled with the fact that employees might not have antivirus protection or have an up-to-date firewall present on their mobile devices, this means they might be more vulnerable to attacks.

6. Device disparities 

With BYOD, employees are likely to have a plethora of devices, all with different capabilities and operating systems that run different programs at different levels of quality. Many companies might not have an IT department resource to ensure all business applications and data workflows work on every different device, which is required for a profitable return on investment. 

7. Cost

Having to pay for both the device and the data plans can increase the total cost of ownership for the organisation. Also, trying to implement guidelines and security for the devices can end up costing the organisation more than it originally planned for when it implemented the BYOD system.

SecOps: Clear opportunities for powerful collaboration
If there’s one thing security and IT ops professionals should do this year, the words ‘team up’ should be top priority.
Interview: Culture and cloud - the battle for cybersecurity
ESET CTO Juraj Malcho talks about the importance of culture in a cybersecurity strategy and the challenges and benefits of a world in the cloud.
Enterprise cloud deployments being exploited by cybercriminals
A new report has revealed a concerning number of enterprises still believe security is the responsibility of the cloud service provider.
Ping Identity Platform updated with new CX and IT automation
The new versions improve the user and administrative experience, while also aiming to meet enterprise needs to operate quickly and purposefully.
Venafi and nCipher Security partner on machine identity protection
Cryptographic keys serve as machine identities and are the foundation of enterprise information technology systems.
Machine learning is a tool and the bad guys are using it
KPMG NZ’s CIO and ESET’s CTO spoke at a recent cybersecurity conference about how machine learning and data analytics are not to be feared, but used.
Seagate: Data trends, opportunities, and challenges at the edge
The development of edge technology and the rise of big data have brought many opportunities for data infrastructure companies to the fore.
Popular Android apps track users and violate Google's policies
Google has reportedly taken action against some of the violators.