SlideShare ist ein Scribd-Unternehmen logo
1 von 11
Downloaden Sie, um offline zu lesen
Bring Your Own Device
besafeonline
One thing is clear: Bring Your Own Device has landed and is here to stay. Employers
need to understand what it means, the benefits it could bring and the risks it presents
to their entire business, not just their data or a single device. Employees, too, need to
understand how this could potentially change the way they work forever.
BYOD
Be Safe Online Bring Your Own Device www.avg.com	2
O
n average we now carry 2.9
devices per person and they
are more powerful than ever.
Think smartphones, mp3 players,
tablets, e-readers and laptops. We can
sometimes do just as much work on a
smartphone as we can on a laptop. The
data they can store is also substantial.
Companies are increasingly adopting
a Bring Your Own Device (BYOD) policy
whereby employees use their own
devices to do their jobs whether at the
office, at home or on the train. As long as
there is work to be done, data, a device,
and a wifi connection to piece it all
together, it sounds like a great idea.
The business benefits are clear too;
employees can work more flexibly,
balancing work and personal life more
easily, lessening the impact on absence
or downtime for the employer.
The business can offer a more flexible
service to its customers outside of the
usual 9-5. And, if employees are buying,
using and maintaining their own devices,
then the business may be able to reduce
its overheads to some extent.
Data and devices can be lost, stolen, and
corrupted. If those devices had access to
the company network then they are at
risk of being hacked. This is the challenge
brought on by technological change
but one that can be overcome by clear
thinking and decisive action.
IntroductionWe’ve all been taking our mobile phones to work for quite some time now. Initially they
would stay in our coats or bags or rest on our desks until they rang or buzzed. That is,
they were purely for personal use and not for work. Oh, how times have changed.
Mike Foreman is a small
business enthusiast, an
ex-IT reseller and AVG’s
General Manager of SMB.
He blogs about topical
SMB issues at http://
blogs.avg.com
BYOD is nowRecent research reveals the sheer variety of devices that people are already using
at work and at home and how they’re using them. This suggests that BYOD is well
on the way from being a trend to becoming the norm.
Be Safe Online Bring Your Own Device www.avg.com 	 3
AVG’s own research* shows
that in addition to employees’
laptops and desktop computers:
	
	 86.1% use a 		
	 smartphone
53% use
a tablet
The tablets being used:
The smartphones being used:
6.6% Microsoft Surface
4.9% HP Envy
22.9% Other
5.1% Blackberry
4% Sony
9.1% Other
18% Samsung Galaxy
13.1% Google Nexus
9.8% Asus
24.2% Samsung
19.2% HTC
9.1% Nokia
52.5% Apple iPad
48.5% Apple iPhone
I
t’s no surprise to see the big
brands such as Apple and Samsung
dominating the usage numbers in our
research. However, be wary of using that
as an indicator for which devices are
appropriate for your business.
Your network and processes will have a
certain technological configuration and
particular functional specification.
So, when you’re considering a BYOD
policy, you should establish which
devices will meet those requirements,
which ones won’t and then advise your
employees accordingly. Don’t just run
with the crowd.
*AVG/TechTarget 2013; totals are more than 100% as some respondents use more than one device
B
eing on the frontline and being
early adopters themselves, many
IT managers already believe BYOD
can deliver a competitive edge through
an increase in productivity, flexibility
and customer service.
That’s not to say those opportunities
are guaranteed or applicable to each
and every company. As ever, the nature
of your business may well dictate what
type of opportunity BYOD will present
you. The general opportunities open to
any business adopting BYOD currently
fall into three broad categories:
Flexibility / Productivity
If employees can work with a range
of devices in different places then
this enables them to work whenever,
wherever. Your customers, too, can
benefit from this change because your
employees may be able to service them
at times which are more convenient to
them and their lifestyle. The traditional
9-5 no longer applies; the working clock
is reset forever.
Time / Cost Savings
If employees use their own devices they
will likely be paying for them, at least in
part. Similarly, they would be responsible
for the time it takes to buy them,
configure them, maintain and upgrade
them, and train themselves in their use.
Employee Satisfaction
Research* published here by Cisco
confirms that business leaders feel that
one of the main benefits of BYOD is
greater job satisfaction for employees.
The second main benefit is perceived
to be improved employee productivity
as BYOD can offer more opportunities
for staff members to collaborate on
projects.
The opportunityAdopting a Bring Your Own Device policy is a great opportunity to rethink how you
do business with your customers and how your employees get things done.
Be Safe Online Bring Your Own Device www.avg.com 	 4
There will be a limit of
interest in adopting
BYOD and in the value it
can deliver
*Cisco research: https://www.cisco.com/web/about/ac79/docs/BYOD.pdf
The benefitsBusinesses that intrinsically rely on technology to carry out their work, from
accountants to web developers, will directly benefit from BYOD because
without the right data and devices they get nothing done.
Be Safe Online Bring Your Own Device www.avg.com 	 5
37mins
66%
Of people take their
laptop home each day
of people use their own laptop for work purposes
of people in the UK use a mobile device for work
the average amount of
time saved by BYOD per
employee each week
42%
58%
16% of companies worldwide
perceived job satisfaction as a
benefit of BYOD
40% of employees think they will
be more productive using their
own device
37% of employees like to work
with any device anywhere
35% of employees like to combine
work and personal use
31% of employees like
BYOD because it avoids
usage constrictions
:)
*The New Statesman: Bring Your Own Device 2013:
http://tinyurl.com/q9yegrf
The risksLike any technological development - and the cultural and behavioral practices
that accompany it - BYOD is no different in that it offers risk as well as reward.
Be Safe Online Bring Your Own Device www.avg.com 	 6
Not relevant - 37.5%
Other - 37.5%
Cost - 12.5%
Security - 12.5%
The top reasons for not
adopting mobile devices 1.
2.
3.
4.
* Based on AVG research
1.
2.
3.
4.
N
ot everyone is rushing
into adopting BYOD. Some
businesses have been put off
because they see no business need;
some reject it out of security concerns.
Others are still assessing what the exact
opportunities, benefits and risks are
and, wisely, don’t want to make a rash
decision for the sake of technology.
As for the specific risks to your business
and your employees using their own
devices, they will vary according to the
depth and breadth of the adoption. That
said, there are some risks that will apply
universally to which you should pay
some mind:
Conflict of Interest
If your employees are using a personal
device for work then it needs to be
partitioned, to keep their private data
separate from their work data.
Loss of Device or Data
If your employees can take their devices
to any location they can be stolen or left
there by accident. If a mobile device is
hacked then your data is also at risk of
being stolen, deleted or corrupted.
Loss of Time or Productivity
A staff member without a device or data
will simply not be able to produce good
work. Alternatively, employees could
spend too much time using their own
device for personal use.
Legal issuesKnowing a little more about some of the most prevalent risks of BYOD from an HR
and legal perspective will help you decide how best to counter them.
Be Safe Online Bring Your Own Device www.avg.com 	 7
Conflicts of interest
Who owns the data and intellectual copyright? If the device is
being used for work and personal reasons and isn’t partitioned i.e.
has no technical barrier between where work and personal data is
being stored, processed or transmitted, then it can be difficult to
prove who owns, or even who created the data in question.
Too much flexibility
Checking work emails on a smartphone on the way home - instead
of shutting up shop the minute they leave the office - benefits
everyone if it relieves pressure and helps a customer get a quicker
reply. But, being technically able to work at any time, is not
necessarily healthy or legal. Your employees can burn themselves
out or put themselves under undue pressure by working at all hours.
Loss of data
When an employee leaves your company, ideally you’ll have a
controlled exit where you can determine which data and devices
need to be retrieved and/or reviewed. If there is a need to wipe
company data from a personal device, then you need to be
mindful of deleting personal data (e.g. photos, videos, music).
If the device has been partitioned, this may be simple to achieve.
If not, you should seek technical and legal advice before wiping
anything. It’s also wise, before going ahead with wiping data
from a personal device, to speak to your employee and give them
the chance of backing up their data. The same advice applies if a
device is stolen or lost.
O
ne thing’s for sure, ignoring or
vastly underestimating the risks
to your devices and data is a
potentially disastrous strategy.
For example, don’t be fooled into
thinking that a hacker won’t be
interested in stealing your mobile
devices or data just because you’re a
small business. Cybercrime can and does
happen to companies, organisations
and institutions of all sizes, shape and
geographic location. But that doesn’t
mean you’re helpless. There are some
basic steps everyone can follow:
Plan ahead and get buy-in upfront:
ask all employees to sign up to your
BYOD policy that explains their rights and
responsibilities, and that allows you to
remotely wipe and monitor the device if
needed.
Be practical: find a good Mobile Device
Management solution to help you
manage the data and devices.
Be proportional: offer BYOD to the
employees who will get the most benefit
and return out of it. It doesn’t have to be
company-wide if you don’t need it to be.
Build a secure network: if your network
is secure to begin with then it becomes
much harder to hack.
Limit remote access to your network:
only those who absolutely need it should
be permitted.
Passwords: change regularly and use a
unique password for each account (8 or
more characters: upper and lowercase
letters, numbers and symbols).
Encrypt your data: Use cloud-based
services to store data and back it up.
Protection
Be Safe Online Bring Your Own Device www.avg.com 	 8
There’s no guaranteed winning formula for protecting your data or devices from
theft, corruption or loss other than remaining aware of the risks and mitigating
them as best you can.
Don’t be fooled into
thinking a hacker won’t
be interested in stealing
your data just because
you’re a small business
T
he first step to roll-out is to
identify the business case for
implementing BYOD. This means
clarifying the benefits, the risks, the
execution and the management.
What will your business gain by allowing
employees to use their own devices for
work? How might time savings, greater
productivity, and both higher employee
and customer satisfaction be achieved?
Once you’ve confirmed the business
case, identify the following:
● The TASKS you need to complete
● The DEVICES you need to access, 	
process and transmit that data
	
● The DATA needed for those tasks
● The PEOPLE who will use the 	
devices and data
That knowledge builds a picture of your
BYOD landscape. Then you can:
1. Create a clear, comprehensive policy
around personal devices and the right for
your business to track devices, access,
and delete all company data. Make sure
this policy integrates with your Starters
and Leavers Policy too.
2. Deliver an informative briefing
where you discuss the policy with your
team and require them to sign up.
Everyone needs a clear understanding of
the benefits and risks of using personal
devices for work, especially of theft and
the need to remote wipe a device. Offer
them training and support.
3. Produce a simple security checklist
for your team to follow. This can include
aspects like activating passcodes for
devices; creating strong passwords;
using secure wi-fi networks outside
the office; and keeping their devices’
software up-to-date.
4. Consider buying in a Mobile
Application Management solution
which will help you manage all the data
and devices. Create an Incident Response
Plan and train the people concerned, so
they know what to do and how to react if
the worst does happen.
Lift off
Be Safe Online Bring Your Own Device www.avg.com 	 9
Rolling out a BYOD policy is not something you can launch and leave; technology
changes, employees come and go, as does data. Your business will evolve too.
Everyone needs a clear
understanding of the
benefits and risks
Bring it on
BYOD is here to stay and offers many potential opportunities and benefits for
small and large businesses alike: flexibility, reduced costs, happier workers.
However, it doesn’t come risk-free: data and devices can be lost, corrupted or
stolen. Employers need to add another policy to their growing list.
Take your time and think through the full consequences of what this
technological change means for you.
Learn more about internet security at www.avg.com/business-security
* Small Business IT Security Health Check
www.avg.com/small-business-it-security-healthcheck

Weitere ähnliche Inhalte

Andere mochten auch

IBM Connect 2013: BYOD at IBM
IBM Connect 2013: BYOD at IBMIBM Connect 2013: BYOD at IBM
IBM Connect 2013: BYOD at IBMChris Pepin
 
BYOD & company owned comparison
BYOD & company owned comparisonBYOD & company owned comparison
BYOD & company owned comparisonPeter Hewer
 
NSWDEC BYOD Checklist
NSWDEC BYOD ChecklistNSWDEC BYOD Checklist
NSWDEC BYOD ChecklistPip Cleaves
 
Building an Effective School BYOD Plan
Building an Effective School BYOD PlanBuilding an Effective School BYOD Plan
Building an Effective School BYOD PlanSam Gliksman
 
10 Steps to a Successful BYOD Strategy
10 Steps to a Successful BYOD Strategy10 Steps to a Successful BYOD Strategy
10 Steps to a Successful BYOD StrategySirius
 
How To Do BYOD Right
How To Do BYOD RightHow To Do BYOD Right
How To Do BYOD RightRapidScale
 
The Financial Impact of BYOD Full Presentation
The Financial Impact of BYOD Full PresentationThe Financial Impact of BYOD Full Presentation
The Financial Impact of BYOD Full PresentationCisco Services
 
Arista Networks - Building the Next Generation Workplace and Data Center Usin...
Arista Networks - Building the Next Generation Workplace and Data Center Usin...Arista Networks - Building the Next Generation Workplace and Data Center Usin...
Arista Networks - Building the Next Generation Workplace and Data Center Usin...Aruba, a Hewlett Packard Enterprise company
 

Andere mochten auch (11)

IBM Connect 2013: BYOD at IBM
IBM Connect 2013: BYOD at IBMIBM Connect 2013: BYOD at IBM
IBM Connect 2013: BYOD at IBM
 
BYOD & company owned comparison
BYOD & company owned comparisonBYOD & company owned comparison
BYOD & company owned comparison
 
Intro to SDN - Part III
Intro to SDN - Part IIIIntro to SDN - Part III
Intro to SDN - Part III
 
Intro to SDN - Part IV
Intro to SDN - Part IVIntro to SDN - Part IV
Intro to SDN - Part IV
 
NSWDEC BYOD Checklist
NSWDEC BYOD ChecklistNSWDEC BYOD Checklist
NSWDEC BYOD Checklist
 
Building an Effective School BYOD Plan
Building an Effective School BYOD PlanBuilding an Effective School BYOD Plan
Building an Effective School BYOD Plan
 
10 Steps to a Successful BYOD Strategy
10 Steps to a Successful BYOD Strategy10 Steps to a Successful BYOD Strategy
10 Steps to a Successful BYOD Strategy
 
How To Do BYOD Right
How To Do BYOD RightHow To Do BYOD Right
How To Do BYOD Right
 
The Financial Impact of BYOD Full Presentation
The Financial Impact of BYOD Full PresentationThe Financial Impact of BYOD Full Presentation
The Financial Impact of BYOD Full Presentation
 
Arista Networks - Building the Next Generation Workplace and Data Center Usin...
Arista Networks - Building the Next Generation Workplace and Data Center Usin...Arista Networks - Building the Next Generation Workplace and Data Center Usin...
Arista Networks - Building the Next Generation Workplace and Data Center Usin...
 
Presentación
PresentaciónPresentación
Presentación
 

Mehr von AVG Technologies

Android performance optimization_guide_h1 2016
Android performance optimization_guide_h1 2016Android performance optimization_guide_h1 2016
Android performance optimization_guide_h1 2016AVG Technologies
 
Avg technologies android app_performance__trends_report_h1 2016
Avg technologies android app_performance__trends_report_h1 2016Avg technologies android app_performance__trends_report_h1 2016
Avg technologies android app_performance__trends_report_h1 2016AVG Technologies
 
AVG Android App Report Q3 2015
AVG Android App Report Q3 2015AVG Android App Report Q3 2015
AVG Android App Report Q3 2015AVG Technologies
 
Weather Forecast for Today? Advert Flood Coming from East
Weather Forecast for Today? Advert Flood Coming from EastWeather Forecast for Today? Advert Flood Coming from East
Weather Forecast for Today? Advert Flood Coming from EastAVG Technologies
 
AVG Android App Performance Report Q1 2015
AVG Android App Performance Report Q1 2015AVG Android App Performance Report Q1 2015
AVG Android App Performance Report Q1 2015AVG Technologies
 
AVG Managed Workplace 9.1 Fact Sheet
AVG Managed Workplace 9.1 Fact SheetAVG Managed Workplace 9.1 Fact Sheet
AVG Managed Workplace 9.1 Fact SheetAVG Technologies
 
Avg Technologies Vawtrak Banking Trojan White Paper
Avg Technologies Vawtrak Banking Trojan White PaperAvg Technologies Vawtrak Banking Trojan White Paper
Avg Technologies Vawtrak Banking Trojan White PaperAVG Technologies
 
AVG Android App Performance Report Q4 2014
AVG Android App Performance Report Q4 2014AVG Android App Performance Report Q4 2014
AVG Android App Performance Report Q4 2014AVG Technologies
 
MEF Global Consumer Trust Report
MEF Global Consumer Trust ReportMEF Global Consumer Trust Report
MEF Global Consumer Trust ReportAVG Technologies
 
AVG Android App Performance Report by AVG Technologies
AVG Android App Performance Report by AVG TechnologiesAVG Android App Performance Report by AVG Technologies
AVG Android App Performance Report by AVG TechnologiesAVG Technologies
 
AVG Protection Reviewer's Guide 2015
AVG Protection Reviewer's Guide 2015AVG Protection Reviewer's Guide 2015
AVG Protection Reviewer's Guide 2015AVG Technologies
 
Tony Anscombe CIS Keynote 2014
Tony Anscombe CIS Keynote 2014Tony Anscombe CIS Keynote 2014
Tony Anscombe CIS Keynote 2014AVG Technologies
 
AVG CIS 2014 Resource Sheet
AVG CIS 2014 Resource SheetAVG CIS 2014 Resource Sheet
AVG CIS 2014 Resource SheetAVG Technologies
 
Tony Anscombe Seminar CIS 2014
Tony Anscombe Seminar CIS 2014Tony Anscombe Seminar CIS 2014
Tony Anscombe Seminar CIS 2014AVG Technologies
 
Yuval Ben-Itzhak Seminar CIS 2014
Yuval Ben-Itzhak Seminar CIS 2014Yuval Ben-Itzhak Seminar CIS 2014
Yuval Ben-Itzhak Seminar CIS 2014AVG Technologies
 
AVG CloudCare Content Filtering Fact Sheet
AVG CloudCare Content Filtering Fact SheetAVG CloudCare Content Filtering Fact Sheet
AVG CloudCare Content Filtering Fact SheetAVG Technologies
 
AVG Internet of Things Survey Oct 2014
AVG Internet of Things Survey Oct 2014AVG Internet of Things Survey Oct 2014
AVG Internet of Things Survey Oct 2014AVG Technologies
 
AVG PC TuneUp Whitepaper 2015
AVG PC TuneUp Whitepaper 2015AVG PC TuneUp Whitepaper 2015
AVG PC TuneUp Whitepaper 2015AVG Technologies
 
AVG Cleaner for Mac Whitepaper 2015
AVG Cleaner for Mac Whitepaper 2015AVG Cleaner for Mac Whitepaper 2015
AVG Cleaner for Mac Whitepaper 2015AVG Technologies
 
AVG Cleaner for iPhone and iPad Whitepaper 2015
AVG Cleaner for iPhone and iPad Whitepaper 2015AVG Cleaner for iPhone and iPad Whitepaper 2015
AVG Cleaner for iPhone and iPad Whitepaper 2015AVG Technologies
 

Mehr von AVG Technologies (20)

Android performance optimization_guide_h1 2016
Android performance optimization_guide_h1 2016Android performance optimization_guide_h1 2016
Android performance optimization_guide_h1 2016
 
Avg technologies android app_performance__trends_report_h1 2016
Avg technologies android app_performance__trends_report_h1 2016Avg technologies android app_performance__trends_report_h1 2016
Avg technologies android app_performance__trends_report_h1 2016
 
AVG Android App Report Q3 2015
AVG Android App Report Q3 2015AVG Android App Report Q3 2015
AVG Android App Report Q3 2015
 
Weather Forecast for Today? Advert Flood Coming from East
Weather Forecast for Today? Advert Flood Coming from EastWeather Forecast for Today? Advert Flood Coming from East
Weather Forecast for Today? Advert Flood Coming from East
 
AVG Android App Performance Report Q1 2015
AVG Android App Performance Report Q1 2015AVG Android App Performance Report Q1 2015
AVG Android App Performance Report Q1 2015
 
AVG Managed Workplace 9.1 Fact Sheet
AVG Managed Workplace 9.1 Fact SheetAVG Managed Workplace 9.1 Fact Sheet
AVG Managed Workplace 9.1 Fact Sheet
 
Avg Technologies Vawtrak Banking Trojan White Paper
Avg Technologies Vawtrak Banking Trojan White PaperAvg Technologies Vawtrak Banking Trojan White Paper
Avg Technologies Vawtrak Banking Trojan White Paper
 
AVG Android App Performance Report Q4 2014
AVG Android App Performance Report Q4 2014AVG Android App Performance Report Q4 2014
AVG Android App Performance Report Q4 2014
 
MEF Global Consumer Trust Report
MEF Global Consumer Trust ReportMEF Global Consumer Trust Report
MEF Global Consumer Trust Report
 
AVG Android App Performance Report by AVG Technologies
AVG Android App Performance Report by AVG TechnologiesAVG Android App Performance Report by AVG Technologies
AVG Android App Performance Report by AVG Technologies
 
AVG Protection Reviewer's Guide 2015
AVG Protection Reviewer's Guide 2015AVG Protection Reviewer's Guide 2015
AVG Protection Reviewer's Guide 2015
 
Tony Anscombe CIS Keynote 2014
Tony Anscombe CIS Keynote 2014Tony Anscombe CIS Keynote 2014
Tony Anscombe CIS Keynote 2014
 
AVG CIS 2014 Resource Sheet
AVG CIS 2014 Resource SheetAVG CIS 2014 Resource Sheet
AVG CIS 2014 Resource Sheet
 
Tony Anscombe Seminar CIS 2014
Tony Anscombe Seminar CIS 2014Tony Anscombe Seminar CIS 2014
Tony Anscombe Seminar CIS 2014
 
Yuval Ben-Itzhak Seminar CIS 2014
Yuval Ben-Itzhak Seminar CIS 2014Yuval Ben-Itzhak Seminar CIS 2014
Yuval Ben-Itzhak Seminar CIS 2014
 
AVG CloudCare Content Filtering Fact Sheet
AVG CloudCare Content Filtering Fact SheetAVG CloudCare Content Filtering Fact Sheet
AVG CloudCare Content Filtering Fact Sheet
 
AVG Internet of Things Survey Oct 2014
AVG Internet of Things Survey Oct 2014AVG Internet of Things Survey Oct 2014
AVG Internet of Things Survey Oct 2014
 
AVG PC TuneUp Whitepaper 2015
AVG PC TuneUp Whitepaper 2015AVG PC TuneUp Whitepaper 2015
AVG PC TuneUp Whitepaper 2015
 
AVG Cleaner for Mac Whitepaper 2015
AVG Cleaner for Mac Whitepaper 2015AVG Cleaner for Mac Whitepaper 2015
AVG Cleaner for Mac Whitepaper 2015
 
AVG Cleaner for iPhone and iPad Whitepaper 2015
AVG Cleaner for iPhone and iPad Whitepaper 2015AVG Cleaner for iPhone and iPad Whitepaper 2015
AVG Cleaner for iPhone and iPad Whitepaper 2015
 

Kürzlich hochgeladen

General Principles of Intellectual Property: Concepts of Intellectual Proper...
General Principles of Intellectual Property: Concepts of Intellectual  Proper...General Principles of Intellectual Property: Concepts of Intellectual  Proper...
General Principles of Intellectual Property: Concepts of Intellectual Proper...Poonam Aher Patil
 
Single or Multiple melodic lines structure
Single or Multiple melodic lines structureSingle or Multiple melodic lines structure
Single or Multiple melodic lines structuredhanjurrannsibayan2
 
Python Notes for mca i year students osmania university.docx
Python Notes for mca i year students osmania university.docxPython Notes for mca i year students osmania university.docx
Python Notes for mca i year students osmania university.docxRamakrishna Reddy Bijjam
 
Making communications land - Are they received and understood as intended? we...
Making communications land - Are they received and understood as intended? we...Making communications land - Are they received and understood as intended? we...
Making communications land - Are they received and understood as intended? we...Association for Project Management
 
On National Teacher Day, meet the 2024-25 Kenan Fellows
On National Teacher Day, meet the 2024-25 Kenan FellowsOn National Teacher Day, meet the 2024-25 Kenan Fellows
On National Teacher Day, meet the 2024-25 Kenan FellowsMebane Rash
 
Unit 3 Emotional Intelligence and Spiritual Intelligence.pdf
Unit 3 Emotional Intelligence and Spiritual Intelligence.pdfUnit 3 Emotional Intelligence and Spiritual Intelligence.pdf
Unit 3 Emotional Intelligence and Spiritual Intelligence.pdfDr Vijay Vishwakarma
 
Towards a code of practice for AI in AT.pptx
Towards a code of practice for AI in AT.pptxTowards a code of practice for AI in AT.pptx
Towards a code of practice for AI in AT.pptxJisc
 
Salient Features of India constitution especially power and functions
Salient Features of India constitution especially power and functionsSalient Features of India constitution especially power and functions
Salient Features of India constitution especially power and functionsKarakKing
 
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...ZurliaSoop
 
Holdier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdfHoldier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdfagholdier
 
Micro-Scholarship, What it is, How can it help me.pdf
Micro-Scholarship, What it is, How can it help me.pdfMicro-Scholarship, What it is, How can it help me.pdf
Micro-Scholarship, What it is, How can it help me.pdfPoh-Sun Goh
 
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...Nguyen Thanh Tu Collection
 
REMIFENTANIL: An Ultra short acting opioid.pptx
REMIFENTANIL: An Ultra short acting opioid.pptxREMIFENTANIL: An Ultra short acting opioid.pptx
REMIFENTANIL: An Ultra short acting opioid.pptxDr. Ravikiran H M Gowda
 
Sociology 101 Demonstration of Learning Exhibit
Sociology 101 Demonstration of Learning ExhibitSociology 101 Demonstration of Learning Exhibit
Sociology 101 Demonstration of Learning Exhibitjbellavia9
 
ICT role in 21st century education and it's challenges.
ICT role in 21st century education and it's challenges.ICT role in 21st century education and it's challenges.
ICT role in 21st century education and it's challenges.MaryamAhmad92
 
Kodo Millet PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...
Kodo Millet  PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...Kodo Millet  PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...
Kodo Millet PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...pradhanghanshyam7136
 
Wellbeing inclusion and digital dystopias.pptx
Wellbeing inclusion and digital dystopias.pptxWellbeing inclusion and digital dystopias.pptx
Wellbeing inclusion and digital dystopias.pptxJisc
 
How to Manage Global Discount in Odoo 17 POS
How to Manage Global Discount in Odoo 17 POSHow to Manage Global Discount in Odoo 17 POS
How to Manage Global Discount in Odoo 17 POSCeline George
 
HMCS Vancouver Pre-Deployment Brief - May 2024 (Web Version).pptx
HMCS Vancouver Pre-Deployment Brief - May 2024 (Web Version).pptxHMCS Vancouver Pre-Deployment Brief - May 2024 (Web Version).pptx
HMCS Vancouver Pre-Deployment Brief - May 2024 (Web Version).pptxmarlenawright1
 
SOC 101 Demonstration of Learning Presentation
SOC 101 Demonstration of Learning PresentationSOC 101 Demonstration of Learning Presentation
SOC 101 Demonstration of Learning Presentationcamerronhm
 

Kürzlich hochgeladen (20)

General Principles of Intellectual Property: Concepts of Intellectual Proper...
General Principles of Intellectual Property: Concepts of Intellectual  Proper...General Principles of Intellectual Property: Concepts of Intellectual  Proper...
General Principles of Intellectual Property: Concepts of Intellectual Proper...
 
Single or Multiple melodic lines structure
Single or Multiple melodic lines structureSingle or Multiple melodic lines structure
Single or Multiple melodic lines structure
 
Python Notes for mca i year students osmania university.docx
Python Notes for mca i year students osmania university.docxPython Notes for mca i year students osmania university.docx
Python Notes for mca i year students osmania university.docx
 
Making communications land - Are they received and understood as intended? we...
Making communications land - Are they received and understood as intended? we...Making communications land - Are they received and understood as intended? we...
Making communications land - Are they received and understood as intended? we...
 
On National Teacher Day, meet the 2024-25 Kenan Fellows
On National Teacher Day, meet the 2024-25 Kenan FellowsOn National Teacher Day, meet the 2024-25 Kenan Fellows
On National Teacher Day, meet the 2024-25 Kenan Fellows
 
Unit 3 Emotional Intelligence and Spiritual Intelligence.pdf
Unit 3 Emotional Intelligence and Spiritual Intelligence.pdfUnit 3 Emotional Intelligence and Spiritual Intelligence.pdf
Unit 3 Emotional Intelligence and Spiritual Intelligence.pdf
 
Towards a code of practice for AI in AT.pptx
Towards a code of practice for AI in AT.pptxTowards a code of practice for AI in AT.pptx
Towards a code of practice for AI in AT.pptx
 
Salient Features of India constitution especially power and functions
Salient Features of India constitution especially power and functionsSalient Features of India constitution especially power and functions
Salient Features of India constitution especially power and functions
 
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
 
Holdier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdfHoldier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdf
 
Micro-Scholarship, What it is, How can it help me.pdf
Micro-Scholarship, What it is, How can it help me.pdfMicro-Scholarship, What it is, How can it help me.pdf
Micro-Scholarship, What it is, How can it help me.pdf
 
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
 
REMIFENTANIL: An Ultra short acting opioid.pptx
REMIFENTANIL: An Ultra short acting opioid.pptxREMIFENTANIL: An Ultra short acting opioid.pptx
REMIFENTANIL: An Ultra short acting opioid.pptx
 
Sociology 101 Demonstration of Learning Exhibit
Sociology 101 Demonstration of Learning ExhibitSociology 101 Demonstration of Learning Exhibit
Sociology 101 Demonstration of Learning Exhibit
 
ICT role in 21st century education and it's challenges.
ICT role in 21st century education and it's challenges.ICT role in 21st century education and it's challenges.
ICT role in 21st century education and it's challenges.
 
Kodo Millet PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...
Kodo Millet  PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...Kodo Millet  PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...
Kodo Millet PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...
 
Wellbeing inclusion and digital dystopias.pptx
Wellbeing inclusion and digital dystopias.pptxWellbeing inclusion and digital dystopias.pptx
Wellbeing inclusion and digital dystopias.pptx
 
How to Manage Global Discount in Odoo 17 POS
How to Manage Global Discount in Odoo 17 POSHow to Manage Global Discount in Odoo 17 POS
How to Manage Global Discount in Odoo 17 POS
 
HMCS Vancouver Pre-Deployment Brief - May 2024 (Web Version).pptx
HMCS Vancouver Pre-Deployment Brief - May 2024 (Web Version).pptxHMCS Vancouver Pre-Deployment Brief - May 2024 (Web Version).pptx
HMCS Vancouver Pre-Deployment Brief - May 2024 (Web Version).pptx
 
SOC 101 Demonstration of Learning Presentation
SOC 101 Demonstration of Learning PresentationSOC 101 Demonstration of Learning Presentation
SOC 101 Demonstration of Learning Presentation
 

AVG Bring Your Own Device (BYOD) eBook

  • 1. Bring Your Own Device besafeonline
  • 2. One thing is clear: Bring Your Own Device has landed and is here to stay. Employers need to understand what it means, the benefits it could bring and the risks it presents to their entire business, not just their data or a single device. Employees, too, need to understand how this could potentially change the way they work forever. BYOD
  • 3. Be Safe Online Bring Your Own Device www.avg.com 2 O n average we now carry 2.9 devices per person and they are more powerful than ever. Think smartphones, mp3 players, tablets, e-readers and laptops. We can sometimes do just as much work on a smartphone as we can on a laptop. The data they can store is also substantial. Companies are increasingly adopting a Bring Your Own Device (BYOD) policy whereby employees use their own devices to do their jobs whether at the office, at home or on the train. As long as there is work to be done, data, a device, and a wifi connection to piece it all together, it sounds like a great idea. The business benefits are clear too; employees can work more flexibly, balancing work and personal life more easily, lessening the impact on absence or downtime for the employer. The business can offer a more flexible service to its customers outside of the usual 9-5. And, if employees are buying, using and maintaining their own devices, then the business may be able to reduce its overheads to some extent. Data and devices can be lost, stolen, and corrupted. If those devices had access to the company network then they are at risk of being hacked. This is the challenge brought on by technological change but one that can be overcome by clear thinking and decisive action. IntroductionWe’ve all been taking our mobile phones to work for quite some time now. Initially they would stay in our coats or bags or rest on our desks until they rang or buzzed. That is, they were purely for personal use and not for work. Oh, how times have changed. Mike Foreman is a small business enthusiast, an ex-IT reseller and AVG’s General Manager of SMB. He blogs about topical SMB issues at http:// blogs.avg.com
  • 4. BYOD is nowRecent research reveals the sheer variety of devices that people are already using at work and at home and how they’re using them. This suggests that BYOD is well on the way from being a trend to becoming the norm. Be Safe Online Bring Your Own Device www.avg.com 3 AVG’s own research* shows that in addition to employees’ laptops and desktop computers: 86.1% use a smartphone 53% use a tablet The tablets being used: The smartphones being used: 6.6% Microsoft Surface 4.9% HP Envy 22.9% Other 5.1% Blackberry 4% Sony 9.1% Other 18% Samsung Galaxy 13.1% Google Nexus 9.8% Asus 24.2% Samsung 19.2% HTC 9.1% Nokia 52.5% Apple iPad 48.5% Apple iPhone I t’s no surprise to see the big brands such as Apple and Samsung dominating the usage numbers in our research. However, be wary of using that as an indicator for which devices are appropriate for your business. Your network and processes will have a certain technological configuration and particular functional specification. So, when you’re considering a BYOD policy, you should establish which devices will meet those requirements, which ones won’t and then advise your employees accordingly. Don’t just run with the crowd. *AVG/TechTarget 2013; totals are more than 100% as some respondents use more than one device
  • 5. B eing on the frontline and being early adopters themselves, many IT managers already believe BYOD can deliver a competitive edge through an increase in productivity, flexibility and customer service. That’s not to say those opportunities are guaranteed or applicable to each and every company. As ever, the nature of your business may well dictate what type of opportunity BYOD will present you. The general opportunities open to any business adopting BYOD currently fall into three broad categories: Flexibility / Productivity If employees can work with a range of devices in different places then this enables them to work whenever, wherever. Your customers, too, can benefit from this change because your employees may be able to service them at times which are more convenient to them and their lifestyle. The traditional 9-5 no longer applies; the working clock is reset forever. Time / Cost Savings If employees use their own devices they will likely be paying for them, at least in part. Similarly, they would be responsible for the time it takes to buy them, configure them, maintain and upgrade them, and train themselves in their use. Employee Satisfaction Research* published here by Cisco confirms that business leaders feel that one of the main benefits of BYOD is greater job satisfaction for employees. The second main benefit is perceived to be improved employee productivity as BYOD can offer more opportunities for staff members to collaborate on projects. The opportunityAdopting a Bring Your Own Device policy is a great opportunity to rethink how you do business with your customers and how your employees get things done. Be Safe Online Bring Your Own Device www.avg.com 4 There will be a limit of interest in adopting BYOD and in the value it can deliver *Cisco research: https://www.cisco.com/web/about/ac79/docs/BYOD.pdf
  • 6. The benefitsBusinesses that intrinsically rely on technology to carry out their work, from accountants to web developers, will directly benefit from BYOD because without the right data and devices they get nothing done. Be Safe Online Bring Your Own Device www.avg.com 5 37mins 66% Of people take their laptop home each day of people use their own laptop for work purposes of people in the UK use a mobile device for work the average amount of time saved by BYOD per employee each week 42% 58% 16% of companies worldwide perceived job satisfaction as a benefit of BYOD 40% of employees think they will be more productive using their own device 37% of employees like to work with any device anywhere 35% of employees like to combine work and personal use 31% of employees like BYOD because it avoids usage constrictions :) *The New Statesman: Bring Your Own Device 2013: http://tinyurl.com/q9yegrf
  • 7. The risksLike any technological development - and the cultural and behavioral practices that accompany it - BYOD is no different in that it offers risk as well as reward. Be Safe Online Bring Your Own Device www.avg.com 6 Not relevant - 37.5% Other - 37.5% Cost - 12.5% Security - 12.5% The top reasons for not adopting mobile devices 1. 2. 3. 4. * Based on AVG research 1. 2. 3. 4. N ot everyone is rushing into adopting BYOD. Some businesses have been put off because they see no business need; some reject it out of security concerns. Others are still assessing what the exact opportunities, benefits and risks are and, wisely, don’t want to make a rash decision for the sake of technology. As for the specific risks to your business and your employees using their own devices, they will vary according to the depth and breadth of the adoption. That said, there are some risks that will apply universally to which you should pay some mind: Conflict of Interest If your employees are using a personal device for work then it needs to be partitioned, to keep their private data separate from their work data. Loss of Device or Data If your employees can take their devices to any location they can be stolen or left there by accident. If a mobile device is hacked then your data is also at risk of being stolen, deleted or corrupted. Loss of Time or Productivity A staff member without a device or data will simply not be able to produce good work. Alternatively, employees could spend too much time using their own device for personal use.
  • 8. Legal issuesKnowing a little more about some of the most prevalent risks of BYOD from an HR and legal perspective will help you decide how best to counter them. Be Safe Online Bring Your Own Device www.avg.com 7 Conflicts of interest Who owns the data and intellectual copyright? If the device is being used for work and personal reasons and isn’t partitioned i.e. has no technical barrier between where work and personal data is being stored, processed or transmitted, then it can be difficult to prove who owns, or even who created the data in question. Too much flexibility Checking work emails on a smartphone on the way home - instead of shutting up shop the minute they leave the office - benefits everyone if it relieves pressure and helps a customer get a quicker reply. But, being technically able to work at any time, is not necessarily healthy or legal. Your employees can burn themselves out or put themselves under undue pressure by working at all hours. Loss of data When an employee leaves your company, ideally you’ll have a controlled exit where you can determine which data and devices need to be retrieved and/or reviewed. If there is a need to wipe company data from a personal device, then you need to be mindful of deleting personal data (e.g. photos, videos, music). If the device has been partitioned, this may be simple to achieve. If not, you should seek technical and legal advice before wiping anything. It’s also wise, before going ahead with wiping data from a personal device, to speak to your employee and give them the chance of backing up their data. The same advice applies if a device is stolen or lost.
  • 9. O ne thing’s for sure, ignoring or vastly underestimating the risks to your devices and data is a potentially disastrous strategy. For example, don’t be fooled into thinking that a hacker won’t be interested in stealing your mobile devices or data just because you’re a small business. Cybercrime can and does happen to companies, organisations and institutions of all sizes, shape and geographic location. But that doesn’t mean you’re helpless. There are some basic steps everyone can follow: Plan ahead and get buy-in upfront: ask all employees to sign up to your BYOD policy that explains their rights and responsibilities, and that allows you to remotely wipe and monitor the device if needed. Be practical: find a good Mobile Device Management solution to help you manage the data and devices. Be proportional: offer BYOD to the employees who will get the most benefit and return out of it. It doesn’t have to be company-wide if you don’t need it to be. Build a secure network: if your network is secure to begin with then it becomes much harder to hack. Limit remote access to your network: only those who absolutely need it should be permitted. Passwords: change regularly and use a unique password for each account (8 or more characters: upper and lowercase letters, numbers and symbols). Encrypt your data: Use cloud-based services to store data and back it up. Protection Be Safe Online Bring Your Own Device www.avg.com 8 There’s no guaranteed winning formula for protecting your data or devices from theft, corruption or loss other than remaining aware of the risks and mitigating them as best you can. Don’t be fooled into thinking a hacker won’t be interested in stealing your data just because you’re a small business
  • 10. T he first step to roll-out is to identify the business case for implementing BYOD. This means clarifying the benefits, the risks, the execution and the management. What will your business gain by allowing employees to use their own devices for work? How might time savings, greater productivity, and both higher employee and customer satisfaction be achieved? Once you’ve confirmed the business case, identify the following: ● The TASKS you need to complete ● The DEVICES you need to access, process and transmit that data ● The DATA needed for those tasks ● The PEOPLE who will use the devices and data That knowledge builds a picture of your BYOD landscape. Then you can: 1. Create a clear, comprehensive policy around personal devices and the right for your business to track devices, access, and delete all company data. Make sure this policy integrates with your Starters and Leavers Policy too. 2. Deliver an informative briefing where you discuss the policy with your team and require them to sign up. Everyone needs a clear understanding of the benefits and risks of using personal devices for work, especially of theft and the need to remote wipe a device. Offer them training and support. 3. Produce a simple security checklist for your team to follow. This can include aspects like activating passcodes for devices; creating strong passwords; using secure wi-fi networks outside the office; and keeping their devices’ software up-to-date. 4. Consider buying in a Mobile Application Management solution which will help you manage all the data and devices. Create an Incident Response Plan and train the people concerned, so they know what to do and how to react if the worst does happen. Lift off Be Safe Online Bring Your Own Device www.avg.com 9 Rolling out a BYOD policy is not something you can launch and leave; technology changes, employees come and go, as does data. Your business will evolve too. Everyone needs a clear understanding of the benefits and risks
  • 11. Bring it on BYOD is here to stay and offers many potential opportunities and benefits for small and large businesses alike: flexibility, reduced costs, happier workers. However, it doesn’t come risk-free: data and devices can be lost, corrupted or stolen. Employers need to add another policy to their growing list. Take your time and think through the full consequences of what this technological change means for you. Learn more about internet security at www.avg.com/business-security * Small Business IT Security Health Check www.avg.com/small-business-it-security-healthcheck