In most of the small businesses, the employees might own latest and more advanced devices like tablets, Ultrabooks or laptops while their employers provide them with desktop computers which are at least 2 or 3 years outdated. So this would be a good opportunity for the businesses to compete with the rival companies. But there are a set of risks that go along with this concept as well, such as the data risk.
IAC 2024 - IA Fast Track to Search Focused AI Solutions
BYOD
1. BYOD
Bring Your Own Device
Biman Pathirage
06 – 04 – 2016
Geveo Weekly Presentation
2. Contents
Introduction
Popularity of BYOD over time
Benefits of BYOD – to the employers
Benefits of BYOD – to the employees
Risks of BYOD
How to secure the BYOD environment
Adoption of BYOD across the world
Conclusion
3. Introduction
BYOD defined as a concept that provides device-independence to
employees in IT organizations. That means, they can use their own
devices in the offices, to do the office work.
The first use of BYOD was initiated back in 2009 and it has been
growing in popularity ever since.
4. Introduction
Mainly SMBs(Small and Medium Businesses), are unable to keep up
with the technology changes in the current tech world when it comes
to physical devices.
This concept is adapted mostly by SMBs which use a lot of mobile
devices in their work.
5. Introduction
Newer technologies – More ahead you are in the race
But why can’t the companies just provide such latest hardware to the
employees and retain full control over the devices?
“Trying to stand in the path of consumerised mobility is likely to be a
damaging and futile exercise. The best thing that an SMB or
enterprise can do is be aware of the benefits and understand the
risks.”
7. Benefits of BYOD – to the employers
Reduces Technology Costs - BYOD programs generally shift costs to
the individual user so companies save a lot of money on up-front device
expenses. The employee will have to pay for his own data and device
maintenance.
50% of the companies who have implemented BYOD already, require employees to cover
their device expenses, and the employees have agreed.
Takes Advantage of Newer Devices - Individual users generally
upgrade to the latest hardware more frequently than most organizations,
which means they’ll have access to faster, sleeker, and more capable
devices.
Improved Productivity – By using their own devices, the employees
are happier at work and in turn increase their productivity.
8. Benefits of BYOD – to the employees
Employee Satisfaction - When the employees are able to use the
devices they already know and love, and achieve higher success rates
because of it, they will be happier working for your company.
Studies have shown that this happiness overpowers the reluctance to pay for their own
devices and services.
Location Independence – Most employees can work from their
homes if they are using their own devices. They don’t always have to
come to the office to do a quick change to their work.
9. Risks of BYOD
Data security – There is no credibility as to with whom the
employee is sharing his organizations’ work, and the amount of
security implemented in the employees device.
Lost or stolen devices – When devices that are registered in a
BYOD network are lost or stolen, sensitive corporate data can fall into
the hands of an outsider. So this is another threat to the existence of
the BYOD model as well.
Nearly 4 million handsets have been lost in the past year in America alone, and 45%
of them reported to have been left at public places.
Fired employees - Typically, retrieving data from the private device
of a fired employee can be a big issue, and this information can easily
be leaked to a rival organization.
10. How to secure the BYOD environment
First and foremost, organizations should not implement a BYOD policy
unless they are fully prepared to handle it. It depends on the products
of the organization.
Use a comprehensive MDM (mobile device management suite) - A
powerful mobile device management solution provides a centralized
dashboard to manage and monitor all the devices connected to a
particular business effectively.
11. How to secure the BYOD environment
BYOD policy should include aspects such as how and when corporate
data should be deleted from a device, what type of data can be
accessed through a personal device and what type of encryption
should be done to protect the data inside.
Implement an effective employee exit strategy.
Require device registration
Create a company cloud
Educate the employees and audit the company network frequently
12. Adoption of BYOD across the world
BRIC economy countries have shown a major interest in BYOD
13. Conclusion
Overall, BYOD is a win-win situation for employees as well as
businesses.
This is a growing trend in the world at the present, providing a lot of
benefits as well as risks – mostly data risk.
Before adapting to this technology, all businesses would require to do
some analysis as to whether this really suits their company policies.
The fact that even some big tech companies such as Intel are using
this concept leads to the conclusion that this is doable, and beneficial
if implemented with proper policies and standards.
14. Conclusion
“With a sound and security-focused BYOD
policy in place, businesses can mitigate the
risks of BYOD while taking full advantage of
its benefits”
15. Sources of data
BYOD: (Bring Your Own Device) Is Your Organization Ready?- Ann Cavoukian, Ph.D.
http://blog.parallels.com/2014/12/10/what-is-byod/
http://www.inc.com/comcast/byod-byoa-a-growing-applicable-trend.html
http://www.msidata.com/pros-and-cons-of-byod-in-mobile-field-workforce
http://www.techradar.com/news/computing/what-is-byod-and-why-is-it-
important--1175088
http://www.pcworld.com/article/246760/pros_and_cons_of_byod_bring_your_ow
n_device_.html
https://www.miradore.com/byod-agile-personal-infrastructure/
1. This is one of the latest trends in the IT industry around the globe.
2. Specially IT related businesses, who use mobile devices such as smartphones, tablets and even laptops
In most of the cases, the employees might own latest and more advanced devices like tablets, Ultrabooks or laptops while their employers provide them with desktop computers which are at least 2 or 3 years outdated. So this would be a good opportunity to compete with the rival companies
Well, most pro analysts have arrived at the conclusion below
So as professional analysts agree, BYOD is a concept to be embraced rather than be thrown away, if a company wants to stay in the competition
As you can clearly see, the popularity of BYOD over the first half of decade have been increasing dramatically and is expected to be at a big 85% by the end of 2020
Businesses can transfer operational expenses to the user while optimizing revenues. It is predicted that an organization can save up to $100 per month per user through this policy
As I have already pointed out in the previous slides, getting up to date is more faster in employees than employers in the current industry
1. The main problem is that if employees like to use their own devices. But, Studies have shown that this happiness overpowers the reluctance to pay for their own devices and services. So they’d be better off using the devices that they love rather than using a totally strange device issued by the company
2. Sometimes, for a small bug fix or a VoIP meeting with a customer, must the employee come to the office? What if he can do this from where he is right now? So this too leads to the employee preference of BYOD as well
So those were some of the benefits of BYOD for both the organizations and the employees. Now let’s take a look at the risks of using BYOD policy
Unsurprisingly the main concern with BYOD model is the security.
1. As most of the people now use smartphones and tablets to surf the internet, these devices have become the primary target for hackers as well. So security of data is the biggest and the most grave threat to the BYOD model
3. An employee might not be honest enough to remove all the sensitive information in his device and its against the law for the employers to clean the devices of their employees as well
For an example if the organization is developing applications for the military, they should never implement BYOD models. Likewise, if the organizations’ information is too sensitive, they should think twice before adapting this method. So it’s evident that this model does not work for all the businesses in operation
2. When a device is lost or stolen, the password can be changed remotely, data and settings can be remotely wiped off, and the device can be reset to factory settings. The device can be controlled even through an SMS.
MDM solutions allow you to remotely monitor apps installed on any device, and easily remove malicious applications. The location of each device too can be tracked and a complete location history created.
2. Access tokens, e-mail access, data and other office related information should be removed completely from an employees device when he resigns. So there should be clear rules for this so that both the parties understand what's at stake before getting in to the BYOD policy
3. Register the MAC address of devices to keep track of them and if required, ban them from the network
4. It enables the company information to be safely accessed from outside of the LAN
5. Do full frequent audits on your network so you are completely aware of every device on site and can pinpoint to the devices when they are new and cause any problem
Now let’s take a look at the adoption of BYOD model across the leading countries of the world.As the economy of 2020 is predicted to be dominated by the BRIC countries, it’s evident that BYOD adoption is going to be more successful than not when we consider the last four columns of this table although there are a lot of drawbacks and complications yet to be solved, because except Russia, all Brazil, India and China are showing much interest in adopting this model to their businesses
By analyzing the benefits to both the employer and employee that I have mentioned previously, we can say that it is a win-win situation for both the parties and it can also be adopted to go together with the agile manifesto, which is being followed by most of the companies in the present
As every good thing comes at a cost, this model too has its drawbacks. But if the companies find out successful remedies to those problems, this can be the next major change in the business and technology world.
It’s important to do a cost benefit analysis and assess whether this is the right model for your business before adapting it.