How Bringing Your Own Device (BYOD) to Work Affects the Workplace

How Bringing Your Own Device (BYOD) to Work Affects the Workplace.jpg

 

In recent years, Bring Your Own Device (BYOD) to work, also called Bring Your Own Technology (BYOT) to work, has become a growing trend and standard practice with businesses around the world. BYOD is a policy that allows employees to use their own mobile devices including smartphones, personal computers, tablets, and laptops at work and use them to access the data within their companies.

 

With the increasing need for a mobile workplace, studies have shown that more than two-thirds of North American and European information workers (employees who use a computer for more than one hour a day at work) prefer to use their own, personal devices, rather than using a device that the company provides them.

 

Employees may not be comfortable with or use efficiently, the devices provided to them by the company they work for. Most employees are also willing to pay for a portion of the software and data plan required by their employer, so they can still use their personal device.

 

Employees are willing to make the cost trade-off to use their own devices at work because they are already familiar with their device and have become an expert at using it. This makes them more productive and efficient employees. Most people consider their devices to be one of the most important objects they own.

 

The trend in mobile working is being driven by simple, accessible and pervasive technology that frees people up to work anytime, anywhere. According to Gartner Inc, the “consumerization of IT” will be the most significant trend affecting IT for the next ten years. It also includes mobile device management, application management, data protection, IT security and much more.

 

Businesses can take advantage of BYOD with a strategy to reduce security risks, financial exposure, and management chaos. This strategy will help IT balance the risk and the benefits of a BYOD policy with a robust program to support it:
Maintain control by managing company information and maintaining liabilities on personal devices.
Share corporate data safely with secure access, backup and file sharing
Protect data wherever it is with context-aware security.

 

As popular new consumer technology enters the workplace, it challenges IT with new security risks, financial exposure, and operational complexity. With these challenges, the question is, how will IT maintain visibility and control of the ever-evolving collection of mobile devices and the consumer apps that propagate with BYOD?

 

To minimize the operation costs of BYOD, businesses need solutions with broad platform support that consolidate management and integrate with their existing security. Mobile device management, mobile application management, mobile safety and data security help ensure visibility and control of BYOD and IT collaboration.

 

Mobile malware relies heavily on user interaction to initiate. The interaction means a bad app can spread to millions of smartphone users instantly when shared on social networking sites. Educating device users about prevention is the first step toward a secure BYOD plan. Here is one of the areas that need to be addressed, since social media is an essential part of people’s lives. You want to make sure that your company’s sensitive information will be protected when your employees visit these sites on their own devices.

 

Companies need a unified security management solution that gives IT control over mobile devices and applications. The safeguards that are essential for the protection of a company’s sensitive data can be costly, that is why IT organizations are experimenting with ways to reduce the operational costs of supporting BYOD.

 

BYOD requires mobile security that protects employee-liable devices as well as control over which devices can access corporate resources.

 

IT organizations are developing mobile device management policies for the provisioning and de-provisioning of employee-owned devices. This will help protect company and personal data, applications, and access. Also, adding password enforcement and encryption technology is as essential as a remote lock and wipe capability to protect data when employees lose their mobile devices.

 

The cloud is one of the driving forces behind BYOD, with mobile devices accessing data from private clouds, social networking, or other cloud services and applications. Mobile device management (MDM), cloud-based security, device locator services, remote wipes for lost or stolen devices and more should all be a part of a solid BYOD plan.

 

Another critical issue, often overlooked, in regards to BYOD that companies must consider and add to their BYOD policies is the phone number problem. The problem becomes apparent when employees in sales and other customer contact roles leave the company and take their phone number with them. Customers calling the number they were given might wind up calling competitors, which can lead to loss of business for companies that promote BYOD.

 

While BYOD is occurring in companies and governments of all sizes, it is most prevalent in midsize and large businesses ($500 million to $5 billion in revenue, with 2,500 to 5,000 employees). BYOD also allows smaller companies to go mobile without an unmanageable device and service investment. Adoption varies widely across the world.

 

Companies in the United States are twice as likely to allow BYOD as those in Europe, where BYOD has the lowest adoption of all the regions. In contrast, employees in India, China, and Brazil are most likely to be using a personal device, typically a standard mobile phone, at work.

 

The future of business is moving more toward a mobile workforce, and there are advantages, as well as disadvantages to BYOD.

 

David Willis, vice president and analyst at Gartner Inc, information technology research, and advisory company, has this to say,

 

“We’re finally reaching the point where IT officially recognizes what has always been going on: People use their business device for nonwork purposes,” said Mr. Willis. “They often use a personal device in business.

 

Once you realize that, you’ll understand you need to protect data in another way besides locking down the full device. It is essential that IT specify which platforms will be supported and how; what service levels a user should expect; what the user’s responsibilities and risks are; who qualifies; and that IT provides guidelines for employees purchasing a personal device for use at work, such as minimum requirements for operating systems.”

 

Thank you for taking the time to visit my blog. If you enjoyed this article, please join my mailing list to make sure you do not miss a single informative and entertaining article as soon as it is published. I encourage you to start or join a discussion by adding a comment at the end of the article.

 

Also, I can help you with any of your professional content needs, including original blog articles, website content and all other forms of content management and marketing.

 

Please contact me at michael@mdtcreative.com, and I will put my 15+ years of experience to work for you.

 

Let’s Spread the Words Together!

Advertisements

32 thoughts on “How Bringing Your Own Device (BYOD) to Work Affects the Workplace

    1. Yes mam, absolutely may. You are welcome to share any of my posts you like and find useful and that you feel your readers will also find useful. I believe there is no greater compliment to my work than another writer who wants to share it with their followers. That truly makes me happy because then I feel like I provided worthwhile quality content.

      So please be my guest and share any of the articles you enjoy.

      Liked by 1 person

  1. I’m a lecturer and my college provides a laptop PC for us. I tend to use that at the office only. I’m much happier on my MAC and tend to do most of my work on that. Everything for work is saved via a cloud anyway. But I do still need to use the PC at the office to access certain things unless I want to buy special adapters for the MAC… which I don’t want to do. Lol

    Like

    1. I hear you and I feel exactly the same way. I have my HP PC and I’ve always had them. They work for me and I prefer working on it. I’m a writer who works from home so I have the advantage of using whatever equipment works for me. However, if I did work outside the office I really would probably handle the situation as you do.

      Liked by 1 person

      1. As they say, “When you enjoy what you do, you will never work a day in your life.” I’m glad you enjoy your work, it is an honorable endevor and I’m sure your pleasure in what you do reflects on the minds you help to inform.

        Liked by 1 person

      2. That’s a lovely thing to say.. I must admit I enjoy my hours in the classroom. The hours in staff meetings not so much! 😄

        Like

    1. Thank you so much for adding this comment Kally, like I said in my response, the feeling is truly mutual. You are a great writer who has a certain flair with their words to convey your feelings directly on to the paper (monitor). Please keep the great pieces coming we are all better off for them.

      Like

  2. This was a very interesting and informative post Michael! I adapt well to different computers, but I really wish I could not only use my own personal laptop but also be able to work from home. I honestly feel I am much more productive when I can do things from the comfort of my own home and part of this is because I live with a painful chronic illness. Unfortunately the company I currently work for does not care much for how their employees feel and what would actually be better for the company. I am actually in the process of trying to first find a job where I can work from home, but in time I really want to try my hand in freelance writing. I am really looking forward to reading more of your posts! Kally, whom I find pretty amazing speaks very highly of you!!

    Like

    1. Alyssa I may be able to help you since I had the same issues and was able to find a solution. Contact me at michael@mdtcreative so we can talk about it. I’m willing to help a person whenever I can.

      Like I always day us writers need to take care of our own.

      Liked by 1 person

      1. Ok, sounds great. Just add your blog name “Positively Alyssa” in the subject so I know it’s you. Also, describe what you want to accomplish and what your writing background is etc. and we can go from there. I can help you avoid all the “Get Rich Quick” schemes and help you find some serious freelance writing gigs you can do out of your home like I started out.

        Liked by 1 person

      2. Thank you! I really can’t thank you enough! I actually applied for a part-time (temporary) blog writer today. We will see how that goes. I am very eager to get this started, so I will probably rely on you with all the questions I am sure will come up!!!

        Like

      3. EXCELLENT! I’ll keep my fingers crossed for you. No need to thank me, I’m glad I can help, we writers need to help our own. Just, when you are able, pay it forward. I welcome all questions, anytime. This is my career and I’m a workaholic. I am usually online from 8 til 5 Eastern US, then from 7ish til ???

        So I’m usually able to reply to emails within an hour of receiving them which is a benefit I provide my clients with. I actually enjoy helping so you are helping me. And don’t hesitate to ask a question even if you think it’s silly. I want to make sure we do this right the first time.

        Like

  3. Great post Micheal. As BYOD trend is picking up across industries, we all need to prepared with good understanding of the pros and cons of the practice.

    Like

Please join the conversation with your input.

Fill in your details below or click an icon to log in:

WordPress.com Logo

You are commenting using your WordPress.com account. Log Out /  Change )

Google+ photo

You are commenting using your Google+ account. Log Out /  Change )

Twitter picture

You are commenting using your Twitter account. Log Out /  Change )

Facebook photo

You are commenting using your Facebook account. Log Out /  Change )

Connecting to %s