Risks Involved In Adopting BYOD

Risks Involved In Adopting BYOD

Risks Involved in Adopting BYOD

Imagine a workplace scenario where every employee has his/her own mobile device to access company data and applications. This way, people get their work done using their own devices in the office. Briefly, this is what Bring Your Own Device or BYOD is all about. All over the world, companies are opening up to this new trend and there are mixed reviews about its usefulness.

phablets

While some say it makes employees more productive, others are more concerned about the risks involved. Irrespective of all this, BYOD has become quite popular in business circles as well as in schools and colleges.

The Reason behind BYOD Growth

Smartphones, tablets, phablets and other mobile devices have made deep inroads with today’s generation of Internet users. Tech-savvy individuals have more than one device that they use for work or pleasure. It comes as no surprise that people started getting these devices to office with them. It was only a matter of time before employees started doing their work through such gadgets.

The growth of Wi-Fi networks is another reason why BYOD has grown so rapidly in the past few years. It doesn’t look like slowing down anytime soon as companies welcome employees who prefer working on their personal devices.

The flipside of this trend is that there are quite a few risks involved.

Unreliable third-party apps:

Many people download such apps and use them on a regular basis. When the same device is brought into contact with a professional network, then the risk of hacking arises. Many third-party apps might be already infected with malware that could harm the proper working of the device. On a bigger scale, it could infiltrate the company network and start creating serious issues.

One way to mitigate this problem is by installing security apps on all the employee devices. This can be a pain, as regular updates need to be downloaded.

Data management and segregation issues:

When employees get their devices to work, questions about access begin to pop up. Should everyone be given permission to view all kinds of files? Obviously not. In a business setting, certain employees will need more access than others will.

When BYOD is in play, it becomes tough for IT departments to segregate data for each employee. This becomes another headache for the company to deal with.

Stolen devices:

Since mobile devices like smartphones and tablets are smaller, the risk of losing them is much higher. According to McAfee, over 30% of individuals fail to set up password protection on their mobile devices. This means that loss or theft could result in a security breach.

If an employee has sensitive company information on his/her tablet or smartphone, then the loss of it could result in bigger problems for the company. This is where BYOD is not such a good idea.

Tracking data difficulties:

The use of cloud services by employees means that data can be moving from one place to another. This becomes a major issue when the company cannot keep track of where all its data is being moved or used.

Hiring a separate company to track data does not always serve the purpose. Employees too can stray from the set guidelines for data movement and this is when additional risks begin to creep in.

Revengeful ex-employees:

If a company has recently fired an employee, then he/she may try to take revenge by leaking important data to public sources. This is something that a company might trick on to after the damage is done.

Sometimes, employees may just forget to inform the HR department that they have a mobile device containing company information. In both cases, chances of leaks are quite high.

Employee expenses:

While this doesn’t usually happen, it can become a problem once BYOD becomes a common occurrence. Certain employees might use their corporate accounts and purchase apps for their personal use.

This means that the company will be footing the bill for an employee’s shopping spree.

For those companies that are thinking of adopting a BYOD approach, strict guidelines need to be set down. Before employees are allowed to bring their own devices to work, a solid security framework should be set up in order to protect company data.

By Sasha Joyner,

Sasha Joyner is a technology enthusiast who is fond of writing helpful tips and fresh tidbits of information about the different fields in technology and innovation. She is currently working with Telco Services

About CloudTweaks

Established in 2009, CloudTweaks is recognized as one of the leading authorities in connected technology information and services.

We embrace and instill thought leadership insights, relevant and timely news related stories, unbiased benchmark reporting as well as offer green/cleantech learning and consultive services around the world.

Our vision is to create awareness and to help find innovative ways to connect our planet in a positive eco-friendly manner.

In the meantime, you may connect with CloudTweaks by following and sharing our resources.

View All Articles

Sorry, comments are closed for this post.

Comics
Lavabit, Edward Snowden and the Legal Battle For Privacy

Lavabit, Edward Snowden and the Legal Battle For Privacy

The Legal Battle For Privacy In early June 2013, Edward Snowden made headlines around the world when he leaked information about the National Security Agency (NSA) collecting the phone records of tens of millions of Americans. It was a dramatic story. Snowden flew to Hong Kong and then Russia to avoid deportation to the US,…

Four Recurring Revenue Imperatives

Four Recurring Revenue Imperatives

Revenue Imperatives “Follow the money” is always a good piece of advice, but in today’s recurring revenue-driven market, “follow the customer” may be more powerful. Two recurring revenue imperatives highlight the importance of responding to, and cherishing customer interactions. Technology and competitive advantage influence the final two. If you’re part of the movement towards recurring…

Using Private Cloud Architecture For Multi-Tier Applications

Using Private Cloud Architecture For Multi-Tier Applications

Cloud Architecture These days, Multi-Tier Applications are the norm. From SharePoint’s front-end/back-end configuration, to LAMP-based websites using multiple servers to handle different functions, a multitude of apps require public and private-facing components to work in tandem. Placing these apps in entirely public-facing platforms and networks simplifies the process, but at the cost of security vulnerabilities. Locating everything…

Technology Influencer in Chief: 5 Steps to Success for Today’s CMOs

Technology Influencer in Chief: 5 Steps to Success for Today’s CMOs

Success for Today’s CMOs Being a CMO is an exhilarating experience – it’s a lot like running a triathlon and then following it with a base jump. Not only do you play an active role in building a company and brand, but the decisions you make have direct impact on the company’s business outcomes for…

Digital Twin And The End Of The Dreaded Product Recall

Digital Twin And The End Of The Dreaded Product Recall

The Digital Twin  How smart factories and connected assets in the emerging Industrial IoT era along with the automation of machine learning and advancement of artificial intelligence can dramatically change the manufacturing process and put an end to the dreaded product recalls in the future. In recent news, Samsung Electronics Co. has initiated a global…

Virtual Immersion And The Extension/Expansion Of Virtual Reality

Virtual Immersion And The Extension/Expansion Of Virtual Reality

Virtual Immersion And Virtual Reality This is a term I created (Virtual Immersion). Ah…the sweet smell of Virtual Immersion Success! Virtual Immersion© (VI) an extension/expansion of Virtual Reality to include the senses beyond visual and auditory. Years ago there was a television commercial for a bathing product called Calgon. The tagline of the commercial was Calgon…

Moving Your Email To The Cloud? Beware Of Unintentional Data Spoliation!

Moving Your Email To The Cloud? Beware Of Unintentional Data Spoliation!

Cloud Email Migration In today’s litigious society, preserving your company’s data is a must if you (and your legal team) want to avoid hefty fines for data spoliation. But what about when you move to the cloud? Of course, you’ve probably thought of this already. You’ll have a migration strategy in place and you’ll carefully…

How The CFAA Ruling Affects Individuals And Password-Sharing

How The CFAA Ruling Affects Individuals And Password-Sharing

Individuals and Password-Sharing With the 1980s came the explosion of computing. In 1980, the Commodore ushered in the advent of home computing. Time magazine declared 1982 was “The Year of the Computer.” By 1983, there were an estimated 10 million personal computers in the United States alone. As soon as computers became popular, the federal government…

Choosing IaaS or a Cloud-Enabled Managed Hosting Provider?

Choosing IaaS or a Cloud-Enabled Managed Hosting Provider?

There is a Difference – So Stop Comparing We are all familiar with the old saying “That’s like comparing apples to oranges” and though we learned this lesson during our early years we somehow seem to discount this idiom when discussing the Cloud. Specifically, IT buyers often feel justified when comparing the cost of a…