Risks Involved In Adopting BYOD

Risks Involved In Adopting BYOD

Risks Involved in Adopting BYOD

Imagine a workplace scenario where every employee has his/her own mobile device to access company data and applications. This way, people get their work done using their own devices in the office. Briefly, this is what Bring Your Own Device or BYOD is all about. All over the world, companies are opening up to this new trend and there are mixed reviews about its usefulness.

phablets

While some say it makes employees more productive, others are more concerned about the risks involved. Irrespective of all this, BYOD has become quite popular in business circles as well as in schools and colleges.

The Reason behind BYOD Growth

Smartphones, tablets, phablets and other mobile devices have made deep inroads with today’s generation of Internet users. Tech-savvy individuals have more than one device that they use for work or pleasure. It comes as no surprise that people started getting these devices to office with them. It was only a matter of time before employees started doing their work through such gadgets.

The growth of Wi-Fi networks is another reason why BYOD has grown so rapidly in the past few years. It doesn’t look like slowing down anytime soon as companies welcome employees who prefer working on their personal devices.

The flipside of this trend is that there are quite a few risks involved.

Unreliable third-party apps:

Many people download such apps and use them on a regular basis. When the same device is brought into contact with a professional network, then the risk of hacking arises. Many third-party apps might be already infected with malware that could harm the proper working of the device. On a bigger scale, it could infiltrate the company network and start creating serious issues.

One way to mitigate this problem is by installing security apps on all the employee devices. This can be a pain, as regular updates need to be downloaded.

Data management and segregation issues:

When employees get their devices to work, questions about access begin to pop up. Should everyone be given permission to view all kinds of files? Obviously not. In a business setting, certain employees will need more access than others will.

When BYOD is in play, it becomes tough for IT departments to segregate data for each employee. This becomes another headache for the company to deal with.

Stolen devices:

Since mobile devices like smartphones and tablets are smaller, the risk of losing them is much higher. According to McAfee, over 30% of individuals fail to set up password protection on their mobile devices. This means that loss or theft could result in a security breach.

If an employee has sensitive company information on his/her tablet or smartphone, then the loss of it could result in bigger problems for the company. This is where BYOD is not such a good idea.

Tracking data difficulties:

The use of cloud services by employees means that data can be moving from one place to another. This becomes a major issue when the company cannot keep track of where all its data is being moved or used.

Hiring a separate company to track data does not always serve the purpose. Employees too can stray from the set guidelines for data movement and this is when additional risks begin to creep in.

Revengeful ex-employees:

If a company has recently fired an employee, then he/she may try to take revenge by leaking important data to public sources. This is something that a company might trick on to after the damage is done.

Sometimes, employees may just forget to inform the HR department that they have a mobile device containing company information. In both cases, chances of leaks are quite high.

Employee expenses:

While this doesn’t usually happen, it can become a problem once BYOD becomes a common occurrence. Certain employees might use their corporate accounts and purchase apps for their personal use.

This means that the company will be footing the bill for an employee’s shopping spree.

For those companies that are thinking of adopting a BYOD approach, strict guidelines need to be set down. Before employees are allowed to bring their own devices to work, a solid security framework should be set up in order to protect company data.

By Sasha Joyner,

Sasha Joyner is a technology enthusiast who is fond of writing helpful tips and fresh tidbits of information about the different fields in technology and innovation. She is currently working with Telco Services

Follow Us!

CloudTweaks

Established in 2009, CloudTweaks.com is recognized as one of the leading authorities in cloud computing information. Most of the excellent CloudTweaks articles are provided by our own paid writers, with a small percentage provided by guest authors from around the globe, including CEOs, CIOs, Technology bloggers and Cloud enthusiasts. Our goal is to continue to build a growing community offering the best in-depth articles, interviews, event listings, whitepapers, infographics and much more...
Follow Us!

2 Responses to Risks Involved In Adopting BYOD

  1. Adopting BYOD into your business does really have a lot of risk.  Besides security issues, your company budget may also be affected as well as the confidentiality of your files and documents.

  2. I think the good side to BYOD out weighs the bad. Passwords can protect lost or stolen devices, Good companies can supply you with apps so your workers do not need 3rd party apps. If a company takes care of employes than even if they leave you will not have that problem. in short I think BYOD is the future way of doing things. http://www.broadconnect.ca/ip-telephone/broadsoft-mobilelink/

Join Our Newsletter

Receive updates each week on news, tips, events, comics and much more...

Can I Contribute To CloudTweaks?

Yes, much of our focus in 2015 will be on working with other influencers in a collaborative manner. If you're a technology influencer looking to collaborate long term with CloudTweaks – a globally recognized leader in cloud computing information – drop us an email with “tech influencer” in the subject line.

Please review the guidelines before applying.