An Inside View of the State of BYOD

By Don Reisinger  |  Posted 06-13-2013
Print this article   Print this article

In the land of the enterprise, there is one trend that CIOs, no matter how hard they try, simply can't sidestep: Bring your own device, or BYOD. At a shockingly rapid rate, companies around the globe are letting their employees to bring their own devices to the office. What's more, those smartphones, tablets and laptops are being used for all types of corporate functions, including checking e-mail, accessing company data, and connecting to the corporate network. While BYOD does improve employee collaboration and productivity, it also raises important security issues.

In a new study from the security firm Webroot, the length at which BYOD has entered the corporate market is described in depth. Webroot found that not only do a majority of companies have BYOD policies in place, but an overwhelming number of them are watching employees use personal devices for work even when they're not authorized to do so. In other words, it's either support the BYOD trend or accept that employees will no longer listen to the IT side of the business.

What About Security?  Given all of those concerns, it would make sense that companies would establish strong security practices for BYOD. However, 69% of firms have no solutions in place to handle BYOD security problems.

An Inside View of the State of BYOD
 
 
Don Reisinger is a freelance technology columnist. He started writing about technology for Ziff-Davis' Gearlog.com. Since then, he has written extremely popular columns for CNET.com, Computerworld, InformationWeek, and others. He has appeared numerous times on national television to share his expertise with viewers. You can follow his every move at http://twitter.com/donreisinger.
 
 
 

Submit a Comment

Loading Comments...