Risks Involved In Adopting BYOD

Risks Involved In Adopting BYOD

Risks Involved in Adopting BYOD

Imagine a workplace scenario where every employee has his/her own mobile device to access company data and applications. This way, people get their work done using their own devices in the office. Briefly, this is what Bring Your Own Device or BYOD is all about. All over the world, companies are opening up to this new trend and there are mixed reviews about its usefulness.

phablets

While some say it makes employees more productive, others are more concerned about the risks involved. Irrespective of all this, BYOD has become quite popular in business circles as well as in schools and colleges.

The Reason behind BYOD Growth

Smartphones, tablets, phablets and other mobile devices have made deep inroads with today’s generation of Internet users. Tech-savvy individuals have more than one device that they use for work or pleasure. It comes as no surprise that people started getting these devices to office with them. It was only a matter of time before employees started doing their work through such gadgets.

The growth of Wi-Fi networks is another reason why BYOD has grown so rapidly in the past few years. It doesn’t look like slowing down anytime soon as companies welcome employees who prefer working on their personal devices.

The flipside of this trend is that there are quite a few risks involved.

Unreliable third-party apps:

Many people download such apps and use them on a regular basis. When the same device is brought into contact with a professional network, then the risk of hacking arises. Many third-party apps might be already infected with malware that could harm the proper working of the device. On a bigger scale, it could infiltrate the company network and start creating serious issues.

One way to mitigate this problem is by installing security apps on all the employee devices. This can be a pain, as regular updates need to be downloaded.

Data management and segregation issues:

When employees get their devices to work, questions about access begin to pop up. Should everyone be given permission to view all kinds of files? Obviously not. In a business setting, certain employees will need more access than others will.

When BYOD is in play, it becomes tough for IT departments to segregate data for each employee. This becomes another headache for the company to deal with.

Stolen devices:

Since mobile devices like smartphones and tablets are smaller, the risk of losing them is much higher. According to McAfee, over 30% of individuals fail to set up password protection on their mobile devices. This means that loss or theft could result in a security breach.

If an employee has sensitive company information on his/her tablet or smartphone, then the loss of it could result in bigger problems for the company. This is where BYOD is not such a good idea.

Tracking data difficulties:

The use of cloud services by employees means that data can be moving from one place to another. This becomes a major issue when the company cannot keep track of where all its data is being moved or used.

Hiring a separate company to track data does not always serve the purpose. Employees too can stray from the set guidelines for data movement and this is when additional risks begin to creep in.

Revengeful ex-employees:

If a company has recently fired an employee, then he/she may try to take revenge by leaking important data to public sources. This is something that a company might trick on to after the damage is done.

Sometimes, employees may just forget to inform the HR department that they have a mobile device containing company information. In both cases, chances of leaks are quite high.

Employee expenses:

While this doesn’t usually happen, it can become a problem once BYOD becomes a common occurrence. Certain employees might use their corporate accounts and purchase apps for their personal use.

This means that the company will be footing the bill for an employee’s shopping spree.

For those companies that are thinking of adopting a BYOD approach, strict guidelines need to be set down. Before employees are allowed to bring their own devices to work, a solid security framework should be set up in order to protect company data.

By Sasha Joyner,

Sasha Joyner is a technology enthusiast who is fond of writing helpful tips and fresh tidbits of information about the different fields in technology and innovation. She is currently working with Telco Services

About CloudTweaks

Established in 2009, CloudTweaks is recognized as one of the leading authorities in connected technology information and services.

We embrace and instill thought leadership insights, relevant and timely news related stories, unbiased benchmark reporting as well as offer green/cleantech learning and consultive services around the world.

Our vision is to create awareness and to help find innovative ways to connect our planet in a positive eco-friendly manner.

In the meantime, you may connect with CloudTweaks by following and sharing our resources.

View All Articles

2 Responses to Risks Involved In Adopting BYOD

  1. Adopting BYOD into your business does really have a lot of risk.  Besides security issues, your company budget may also be affected as well as the confidentiality of your files and documents.

  2. I think the good side to BYOD out weighs the bad. Passwords can protect lost or stolen devices, Good companies can supply you with apps so your workers do not need 3rd party apps. If a company takes care of employes than even if they leave you will not have that problem. in short I think BYOD is the future way of doing things. http://www.broadconnect.ca/ip-telephone/broadsoft-mobilelink/

SaaS Freemium Models and the Hidden Cost of Free

SaaS Freemium Models and the Hidden Cost of Free

SaaS Freemium Models We’ve all been lured into sexy “try before you buy” freemium models that provide just the right amount of functionality to get you started. Yet, it’s not quite enough to complete the job. “Getting the job done” often requires stepping up to a paid or premium version that provides more functionality, capabilities…

Carve Outs And The Cloud: A Synergistic Coupling

Carve Outs And The Cloud: A Synergistic Coupling

Carve Outs and the Cloud The mergers and acquisitions market is a complex and challenging industry and the last two years has seen a rise in the number of transactions. Working with companies in this space over the last 10 years, we at RKON have seen and hopefully helped change the mindset of private equity…

Finally, The Time For Security Information Event Management (SIEM)

Finally, The Time For Security Information Event Management (SIEM)

The Time For SIEM Security Information Event Management (SIEM) tools have been around for a long time. My first encounter with a SIEM vendor was about twenty years ago while being courted to resell their product. To this day, I still recall two vivid memories from that meeting; the product was very complex and quite…

World Backup Day: Understand The Data You Are Protecting

World Backup Day: Understand The Data You Are Protecting

World Backup Day: Understand The Data You Are Protecting Did you know that 113 phones are lost or stolen every minute? What about the fact that 1 in 10 computers are infected with a virus every month? Thanks to World Backup Day, an independent initiative that was started in 2011, awareness is being raised about…

The Rise of Fintech and the End of Traditional Banking

The Rise of Fintech and the End of Traditional Banking

The Rise of Fintech Developments in financial technology, or fintech, are changing the way we make payments, with new products gradually transforming how personal and commercial transactions are processed. The pace of these developments has opened up a whole range of opportunities for fintech start-ups and new players; but the arrival of cutting-edge technology has…

New Smartphones From Apple, Samsung and HTC Promise To Light Up 2016

New Smartphones From Apple, Samsung and HTC Promise To Light Up 2016

New Smartphones from Apple, Samsung and HTC (Sponsored post courtesy of Verizon Wireless) The launch of the Galaxy S7 Edge at the Mobile World Congress in Barcelona during February was the first shot in a vintage year for mobile phones. The S7 is an incredible piece of hardware, but launches from HTC and Apple later in the…

Featured Sponsored Articles
How Successful Businesses Ensure Quality Team Communication

How Successful Businesses Ensure Quality Team Communication

Quality Team Communication  (Sponsored post courtesy of Hubgets) Successful team communication and collaboration are as vital to project and overall business success as the quality of products and services an organization develops. We rely on a host of business tools to ensure appropriate customer interactions, sound product manufacturing, and smooth back-end operations. However, the interpersonal relationships…

Featured Sponsored Articles
How To Develop A Business Continuity Plan Using Internet Performance Management

How To Develop A Business Continuity Plan Using Internet Performance Management

Internet Performance Management Planning CDN Performance Series Provided By Dyn In our previous post, we laid out the problems of business continuity and Internet Performance Management in today’s online environment.  In this article, we will take a look at some of the ways you can use traffic steering capabilities to execute business continuity planning and…

Featured Sponsored Articles

CloudTweaks is recognized as one of the leading influencers in cloud computing, infosec, big data and the internet of things (IoT) information. Our goal is to continue to build our growing information portal by providing the best in-depth articles, interviews, event listings, whitepapers, infographics and much more.

Sponsor