Risks Involved In Adopting BYOD

Risks Involved In Adopting BYOD

Risks Involved in Adopting BYOD

Imagine a workplace scenario where every employee has his/her own mobile device to access company data and applications. This way, people get their work done using their own devices in the office. Briefly, this is what Bring Your Own Device or BYOD is all about. All over the world, companies are opening up to this new trend and there are mixed reviews about its usefulness.

phablets

While some say it makes employees more productive, others are more concerned about the risks involved. Irrespective of all this, BYOD has become quite popular in business circles as well as in schools and colleges.

The Reason behind BYOD Growth

Smartphones, tablets, phablets and other mobile devices have made deep inroads with today’s generation of Internet users. Tech-savvy individuals have more than one device that they use for work or pleasure. It comes as no surprise that people started getting these devices to office with them. It was only a matter of time before employees started doing their work through such gadgets.

The growth of Wi-Fi networks is another reason why BYOD has grown so rapidly in the past few years. It doesn’t look like slowing down anytime soon as companies welcome employees who prefer working on their personal devices.

The flipside of this trend is that there are quite a few risks involved.

Unreliable third-party apps:

Many people download such apps and use them on a regular basis. When the same device is brought into contact with a professional network, then the risk of hacking arises. Many third-party apps might be already infected with malware that could harm the proper working of the device. On a bigger scale, it could infiltrate the company network and start creating serious issues.

One way to mitigate this problem is by installing security apps on all the employee devices. This can be a pain, as regular updates need to be downloaded.

Data management and segregation issues:

When employees get their devices to work, questions about access begin to pop up. Should everyone be given permission to view all kinds of files? Obviously not. In a business setting, certain employees will need more access than others will.

When BYOD is in play, it becomes tough for IT departments to segregate data for each employee. This becomes another headache for the company to deal with.

Stolen devices:

Since mobile devices like smartphones and tablets are smaller, the risk of losing them is much higher. According to McAfee, over 30% of individuals fail to set up password protection on their mobile devices. This means that loss or theft could result in a security breach.

If an employee has sensitive company information on his/her tablet or smartphone, then the loss of it could result in bigger problems for the company. This is where BYOD is not such a good idea.

Tracking data difficulties:

The use of cloud services by employees means that data can be moving from one place to another. This becomes a major issue when the company cannot keep track of where all its data is being moved or used.

Hiring a separate company to track data does not always serve the purpose. Employees too can stray from the set guidelines for data movement and this is when additional risks begin to creep in.

Revengeful ex-employees:

If a company has recently fired an employee, then he/she may try to take revenge by leaking important data to public sources. This is something that a company might trick on to after the damage is done.

Sometimes, employees may just forget to inform the HR department that they have a mobile device containing company information. In both cases, chances of leaks are quite high.

Employee expenses:

While this doesn’t usually happen, it can become a problem once BYOD becomes a common occurrence. Certain employees might use their corporate accounts and purchase apps for their personal use.

This means that the company will be footing the bill for an employee’s shopping spree.

For those companies that are thinking of adopting a BYOD approach, strict guidelines need to be set down. Before employees are allowed to bring their own devices to work, a solid security framework should be set up in order to protect company data.

By Sasha Joyner,

Sasha Joyner is a technology enthusiast who is fond of writing helpful tips and fresh tidbits of information about the different fields in technology and innovation. She is currently working with Telco Services

Follow Us!

CloudTweaks

Established in 2009, CloudTweaks.com is recognized as one of the leading authorities in cloud computing information. Most of the excellent CloudTweaks articles are provided by our own paid writers, with a small percentage provided by guest authors from around the globe, including CEOs, CIOs, Technology bloggers and Cloud enthusiasts. Our goal is to continue to build a growing community offering the best in-depth articles, interviews, event listings, whitepapers, infographics and much more...
Follow Us!

2 Responses to Risks Involved In Adopting BYOD

  1. Adopting BYOD into your business does really have a lot of risk.  Besides security issues, your company budget may also be affected as well as the confidentiality of your files and documents.

  2. I think the good side to BYOD out weighs the bad. Passwords can protect lost or stolen devices, Good companies can supply you with apps so your workers do not need 3rd party apps. If a company takes care of employes than even if they leave you will not have that problem. in short I think BYOD is the future way of doing things. http://www.broadconnect.ca/ip-telephone/broadsoft-mobilelink/

Comics

At CloudTweaks, we're plugged into the cloud, the internet of things and all that the web has to offer. From wearable technology, to mobile computing, cloud computing and big data, CloudTweaks is your source for updates and news on the most innovative technology.

Popular

Top Viral Impact

Cloud Infographic – Cyber Security And The New Frontier

Cloud Infographic – Cyber Security And The New Frontier

Cyber Security: The New Frontier The security environment of the 21st century is constantly evolving, and it’s difficult to predict where the next threats and dangers will come from. But one thing is clear: the ever-expanding frontier of digital space will continue to present firms and governments with security challenges. From politically-motivated Denial-of-Service attacks to…

Cloud Computing Offers Key Benefits For Small, Medium Businesses

Cloud Computing Offers Key Benefits For Small, Medium Businesses

A growing number of small and medium businesses in the United States rely on as a means of deploying mission-critical software products. Prior to the advent of cloud-based products — software solutions delivered over the Internet – companies were often forced to invest in servers and other products to run software and store data. The…

BYOD Will Continue To Define Workplaces In 2014

BYOD Will Continue To Define Workplaces In 2014

BYOD Will Continue To Define Workplaces In 2014 The bring-your-own-device trend has been the subject of scrutiny ever since its initial formation. Given how quickly personal smartphones and tablets became a fixture in everyday life, it makes perfect sense that these mobile machines would slip into workplaces. While BYOD has caused headaches for many businesses,…

Cloud Infographic – The Power Of Cloud Disaster Recovery

Cloud Infographic – The Power Of Cloud Disaster Recovery

Cloud Infographic – The Power Of Cloud Disaster Recovery Preventing a Cloud Disaster is one thing. Recovering from a disaster is a whole other area of concern. Today’s infographic provided by CloudVelox outlines some best practices and safeguards in order to help your business make more informed decisions. About Latest Posts Follow Us!CloudTweaksEstablished in 2009,…

Featured Sponsors

The Internet of Everything Opens Up The World

The Internet of Everything Opens Up The World

Shaping The World With New Technologies As a connected collection of intelligent objects, the Internet of Everything promises to open up those areas of the world hardest hit by economic, political and agricultural blights. Relatively inexpensive devices, paired with revolutionary energy sources and unprecedented access to information offer great promise to farmers and workers in…

Sponsors

Is SaaS For You? Three Questions To Ask

Is SaaS For You? Three Questions To Ask

The idea of providing software to customers for a fee without the need for investments in IT infrastructure or staff has been around for decades. In the 1970s it was called Timesharing. Back then, companies utilized Timesharing services as their primary source of IT applications or as an extension of in-house IT applications, thereby avoiding…

Placement Opportunities - Find Out!

Established in 2009, CloudTweaks is recognized as one of the leading influencers in cloud computing, big data and internet of things (IoT) information. Our goal is to continue to build our growing information portal, by providing the best in-depth articles, interviews, event listings, whitepapers, infographics and much more.

You can help continue to support our community by social sharing, sponsoring, partnering or contributing to this great educational resource.

Contact

CloudTweaks Media
Phone: 1 (212) 763-0021

Join Our Newsletter