SHARE
Facebook X Pinterest WhatsApp

Tackling BYOD Security Can Be ‘Full-Time Task’ for Firms

BYOD policy Security Issues Often Kept Secret Businesses are leaving themselves open to security breaches due to improper employee security training. A quarter of business users admitted to having had a security issue with their personal device in 2013, but just 27 percent of those respondents said they felt obligated to report this to their […]

Written By
thumbnail Nathan Eddy
Nathan Eddy
Jun 2, 2014
Channel Insider content and product recommendations are editorially independent. We may make money when you click on links to our partners. Learn More

BYOD policy

1 - Security Issues Often Kept SecretSecurity Issues Often Kept Secret

Businesses are leaving themselves open to security breaches due to improper employee security training. A quarter of business users admitted to having had a security issue with their personal device in 2013, but just 27 percent of those respondents said they felt obligated to report this to their employers.

2 - Small Percentage of Firms Request BYOD AgreementsSmall Percentage of Firms Request BYOD Agreements

Gartner found that 26 percent of those polled said their employers required use of BYOD devices, and 15 percent of respondents said they signed a BYOD agreement. However, 59 percent who regularly use their private devices for work have not yet signed a formal agreement with their employer.

3 - Social Media, Work and Productivity Are MixedSocial Media, Work and Productivity Are Mixed

Almost half said they spend more than an hour every day using personal devices for work, and approximately half of respondents regularly use their devices for both social and productivity tasks. This suggests work-related documents are regularly being transferred to private devices, Gartner said.

4 - Businesses Must Make a Decision on Data SecurityBusinesses Must Make a Decision on Data Security

Enterprises must decide whether to allow employee-owned devices to access their enterprise’s network and information. Companies failing to embrace BYOD will force it underground and into the shadows, potentially resulting in security issues, the report warns.

5 - Many Firms Lack the Organization for BYODMany Firms Lack the Organization for BYOD

Companies, especially small and midsize businesses, may not have the proper organizational structures to create BYOD policies and must reorganize to provide the necessary governance for a successful BYOD program. “Organizations that do decide to allow employee-owned devices need to develop solid BYOD policies based on their business requirements and risk profits,” Escherich said.

6 - You Don't Have to Go It AloneYou Don’t Have to Go It Alone

Businesses will need assistance from telecom service providers to “evaluate and implement policies and procedures, ongoing user education, and sourcing and deploying mobile security, encryption and mobile-device management solutions,” Escherich advised.

7 - Different Standards for Different RegionsDifferent Standards for Different Regions

There are significant differences in BYOD adoption and attitudes in different countries and regions. For example, emerging markets appear less focused on security and more on the immediate cost benefits. The report found the U.S. market to be more advanced than most.

8 - Android Use Is Widespread, VPN Connections Less SoAndroid Use Is Widespread, VPN Connections Less So

Almost two-thirds (65 percent) of employers permit the use of privately owned Android devices for work. Twenty percent regularly connect private devices to their network through a VPN.

Recommended for you...

SailPoint Intros Accelerated Application Management Solution
Jordan Smith
Aug 22, 2025
ConnectWise Partners with Proofpoint on Security in Asio
Jordan Smith
Aug 22, 2025
RegScale CRO on Channel Growth in Risk & Compliance
Victoria Durgin
Aug 22, 2025
Sherweb Expanding Portfolio Offerings With Expert Guidance
Jordan Smith
Aug 15, 2025
Channel Insider Logo

Channel Insider combines news and technology recommendations to keep channel partners, value-added resellers, IT solution providers, MSPs, and SaaS providers informed on the changing IT landscape. These resources provide product comparisons, in-depth analysis of vendors, and interviews with subject matter experts to provide vendors with critical information for their operations.

Property of TechnologyAdvice. © 2025 TechnologyAdvice. All Rights Reserved

Advertiser Disclosure: Some of the products that appear on this site are from companies from which TechnologyAdvice receives compensation. This compensation may impact how and where products appear on this site including, for example, the order in which they appear. TechnologyAdvice does not include all companies or all types of products available in the marketplace.