Home Cybersecurity Is it safe to BYOD (bring your own device)?

Is it safe to BYOD (bring your own device)?

Author

Date

Category

2 min read

87% of companies rely on their employees using personal devices to access business apps.1 While this means better accessibility between colleagues and potential cost benefits for the business, it could also mean increased risk.

BYOD (bring your own device) is the policy of permitting employees to bring their personal devices (laptops, tablets and smartphones) to work, and allowing them to use the devices to access privileged company information and applications.2

What’s the advantage?

69% of IT decision-makers see BYOD as a positive addition to the workplace because it saves workers time and increases productivity since employees are more familiar with their own devices.3 You’ll also save on tech costs since you won’t need to provide devices to each employee.

BYOD also helps to nurture mutual benefits like:

  • Increased employee productivity
    When your employees can work from anywhere, they put in an average of 2 additional hours of work per day.4
  • Increased employee pride
    Employees who see their employer as being ‘mobile pioneers’ are generally more productive, satisfied and loyal.5
  • Increased revenue for your business
    Technology has given way to an ear of immediacy. Your clients expect prompt responses to their calls, emails and texts. A delayed response could mean lost revenue. Businesses that respond to a web inquiry within 5 minutes are 9x more likely to convert the lead to a sale.6

That all sounds great, but what about security?

It may sound like a cautionary tale, but take care not to trade convenience for complacency. As much as 88% of employees lack awareness on how to prevent a security breach.5 From data compromises to the loss of confidential info through transient employees, there are a myriad of security risks associated with BYOD.

Here are a few things to keep top of mind:

  • Craft a robust BYOD policy and educate your employees on acceptable use of their device for work purposes.
  • Make sure your connectivity solution offers the option for integrated and automated security controls to protect your business data and infrastructure from malware, unauthorized users and intrusion.
  • Think about how their devices will be protected from malware when they connect to your network infrastructure, and how their devices will be updated with software and patches.
  • Choose a Wi-Fi solution that segregates access and includes a built-in firewall for granular visibility and control for optimal security for devices hardwired in and using Wi-Fi.
  • Be vigilant—monitor access, usage, and always be on the look-out for inappropriate use or breaches that put your business at risk.

While being in your employees’ pockets is convenient, be sure that you put your business’s security first. In addition to this, consider the other elements that make up a successful BYOD policy, like communicating to your team how and when it’s appropriate to use their own device at work and how to make the most of collaborating while on the go.

Want to stay connected and confident in your security?

Allow your employees to work securely from anywhere with ultrafast Managed Wi-Fi that’s designed for busy businesses like yours. With smarter connectivity, your team can access the network safely through a connection that’s separate from your guests or customers. Learn more at cogeco.ca/managedwifi.

 

Sources:

1 https://www.insight.com/en_US/learn/content/2017/01182017-byod-statistics-provide-snapshot-of-future.html

2 https://whatis.techtarget.com/definition/BYOD-bring-your-own-device

3 https://www.insight.com/en_US/learn/content/2017/01182017-byod-statistics-provide-snapshot-of-future.html

4www.arubanetworks.com/download.php?file=/assets/EIUStudy.pdf

5www.arubanetworks.com/download.php?file=/assets/EIUStudy.pdf

6 https://www.hrdive.com/news/employees-use-personal-devices-for-work-without-much-oversight/523913/

 

LEAVE A REPLY

Please enter your comment!
Please enter your name here

Recent posts

Keep your data safe with a trusted cloud host

Your business’s data may be flying high in the cloud, but it can quickly be brought back down to earth by security threats and...

On-premise versus the cloud. What’s best?

Deciding whether to keep your server in-house or outsource to the cloud is a big business decision. To help make your choice easier, we’ve...

Your checklist for choosing a cloud provider

The cloud can be great for business. It helps to cut costs, streamline processes, and eliminates the need for hardware and in-house IT. It...

Why Canadian SMBs are threatened by ransomware

Why Canadian SMBs are threatened by ransomware and other malware attacks You do have to hand it to the cyber attackers: ransomware are a pretty...

Why password management is critical to your business security

Passwords are a pretty big deal If you’ve been following our blog, you’ll probably have noticed a recurring theme across our cybersecurity tips and articles:...