Recent Trends In BYOD Have Businesses Leaping Towards Wrong Decisions

Recent Trends In BYOD Have Businesses Leaping Towards Wrong Decisions

As I have been discussing BYOD (Bring Your Own Device) for some time now, some of you might already be familiar with it. For those who are not, BYOD as the name suggests, is about bringing your own personal devices for work use, as opposed to employing a company issued device. This usually refers to mobile devices like laptops, tablets and smart phones; I doubt anyone would bring their home desktop to work. To cut it short, BYOD is going to give some corporate IT officers headaches in the future as they are driven to make some over zealous decisions now.

Many CIO’s and IT administrators might not have realized that they have made some wrong decisions. What I am talking about is the recent surge in the number of companies quickly adapting BYOD policies because it is seen as a perk that will help appease the employee population and entice potential employees. That is not bad at all as BYOD is expected to add to employee satisfaction and productivity and is an essential component for work-shifting. The problem lies with how companies are approaching it –like a band aid solution. They are trying to implement it quickly that they are considering using cheap and lightweight device management solutions or web-based tools in order to control these devices and add a measure of security and management. This is all well and good in the beginning, but it isn’t until they try to develop or implement apps into those devices that problems start cropping up everywhere.

BYOD is merely a name and does not dictate the method of implementation. Just because, it refers to devices does not mean that we have to concentrate on the device. New devices are being released very quickly and people are replacing their devices just as fast. It will simply be a hassle to secure the device itself, it would be easier to secure and maintain the mobile app so that it will be usable in any device without really doing anything to the device itself.

Mobile device management (MDM) experts agree that the future for enterprise mobility management (EMM) lay with mobile application management (MAM). You need to secure the application, even make it cross-platform so that no matter what kind of device, it is still usable. The employee does not have to sign any confidentiality agreement involving the device, and IT does not need to wipe the device or do more than simple tweaking of settings. It should be as non-invasive as possible.

By Abdul Salam

Sorry, comments are closed for this post.

Despite Record Breaches, Secure Third Party Access Still Not An IT Priority

Despite Record Breaches, Secure Third Party Access Still Not An IT Priority

Secure Third Party Access Still Not An IT Priority Research has revealed that third parties cause 63 percent of all data breaches. From HVAC contractors, to IT consultants, to supply chain analysts and beyond, the threats posed by third parties are real and growing. Deloitte, in its Global Survey 2016 of third party risk, reported…

3 Keys To Keeping Your Online Data Accessible

3 Keys To Keeping Your Online Data Accessible

Online Data Data storage is often a real headache for businesses. Additionally, the shift to the cloud in response to storage challenges has caused security teams to struggle to reorient, leaving 49 percent of organizations doubting their experts’ ability to adapt. Even so, decision makers should not put off moving from old legacy systems to…

The Rise Of BI Data And How To Use It Effectively

The Rise Of BI Data And How To Use It Effectively

The Rise of BI Data Every few years, a new concept or technological development is introduced that drastically improves the business world as a whole. In 1983, the first commercially handheld mobile phone debuted and provided workers with an unprecedented amount of availability, leading to more productivity and profits. More recently, the Cloud has taken…

The Cancer Moonshot: Collaboration Is Key

The Cancer Moonshot: Collaboration Is Key

Cancer Moonshot In his final State of the Union address in January 2016, President Obama announced a new American “moonshot” effort: finding a cure for cancer. The term “moonshot” comes from one of America’s greatest achievements, the moon landing. If the scientific community can achieve that kind of feat, then surely it can rally around…

Cost of the Cloud: Is It Really Worth It?

Cost of the Cloud: Is It Really Worth It?

Cost of the Cloud Cloud computing is more than just another storage tier. Imagine if you’re able to scale up 10x just to handle seasonal volumes or rely on a true disaster-recovery solution without upfront capital. Although the pay-as-you-go pricing model of cloud computing makes it a noticeable expense, it’s the only solution for many…

How The CFAA Ruling Affects Individuals And Password-Sharing

How The CFAA Ruling Affects Individuals And Password-Sharing

Individuals and Password-Sharing With the 1980s came the explosion of computing. In 1980, the Commodore ushered in the advent of home computing. Time magazine declared 1982 was “The Year of the Computer.” By 1983, there were an estimated 10 million personal computers in the United States alone. As soon as computers became popular, the federal government…

The Future Of Cloud Storage And Sharing…

The Future Of Cloud Storage And Sharing…

Box.net, Amazon Cloud Drive The online (or cloud) storage business has always been a really interesting industry. When we started Box in 2005, it was a somewhat untouchable category of technology, perceived to be a commodity service with low margins and little consumer willingness to pay. All three of these factors remain today, but with…