Tackling BYOD Security Can Be ‘Full-Time Task’ for Firms

BYOD policy

1 - Security Issues Often Kept SecretSecurity Issues Often Kept Secret

Businesses are leaving themselves open to security breaches due to improper employee security training. A quarter of business users admitted to having had a security issue with their personal device in 2013, but just 27 percent of those respondents said they felt obligated to report this to their employers.

2 - Small Percentage of Firms Request BYOD AgreementsSmall Percentage of Firms Request BYOD Agreements

Gartner found that 26 percent of those polled said their employers required use of BYOD devices, and 15 percent of respondents said they signed a BYOD agreement. However, 59 percent who regularly use their private devices for work have not yet signed a formal agreement with their employer.

3 - Social Media, Work and Productivity Are MixedSocial Media, Work and Productivity Are Mixed

Almost half said they spend more than an hour every day using personal devices for work, and approximately half of respondents regularly use their devices for both social and productivity tasks. This suggests work-related documents are regularly being transferred to private devices, Gartner said.

4 - Businesses Must Make a Decision on Data SecurityBusinesses Must Make a Decision on Data Security

Enterprises must decide whether to allow employee-owned devices to access their enterprise’s network and information. Companies failing to embrace BYOD will force it underground and into the shadows, potentially resulting in security issues, the report warns.

5 - Many Firms Lack the Organization for BYODMany Firms Lack the Organization for BYOD

Companies, especially small and midsize businesses, may not have the proper organizational structures to create BYOD policies and must reorganize to provide the necessary governance for a successful BYOD program. “Organizations that do decide to allow employee-owned devices need to develop solid BYOD policies based on their business requirements and risk profits,” Escherich said.

6 - You Don't Have to Go It AloneYou Don’t Have to Go It Alone

Businesses will need assistance from telecom service providers to “evaluate and implement policies and procedures, ongoing user education, and sourcing and deploying mobile security, encryption and mobile-device management solutions,” Escherich advised.

7 - Different Standards for Different RegionsDifferent Standards for Different Regions

There are significant differences in BYOD adoption and attitudes in different countries and regions. For example, emerging markets appear less focused on security and more on the immediate cost benefits. The report found the U.S. market to be more advanced than most.

8 - Android Use Is Widespread, VPN Connections Less SoAndroid Use Is Widespread, VPN Connections Less So

Almost two-thirds (65 percent) of employers permit the use of privately owned Android devices for work. Twenty percent regularly connect private devices to their network through a VPN.

RELATED ARTICLES

Must Read