Table of contents
There are several important advantages for employees and employers when it comes to bringing their own devices to work which is why for the most part is being acceptable but there are also significant concerns that are starting to build up when it comes to security measures and managing the risk. Companies and individuals involved or thinking about getting involved with BYOD polices are think carefully about the risks as well as the rewards. In the business point of view, it maybe a bit of a huge discount but later on it cause some serious damaged if overlooked.
Bring Your Own Device also known as BYOD is an organization’s approach that enable the clients to use their own devices in a working environment. BYOD encourages everyone in a company to use their mobile devices to complete their work tasks. The policy for the most part grants the permission for workers to access corporate resources with their personal devices. The reason for this Is because studies show that those who use their own personal belongings to do their task tend to feel more comfortable and more productive than those using the out of date computers that some company tend to have. BYOD according to J.P. Shim have many advantages both in the perspectives of the customers and employers. For workers they tend to be feel more confident with the idea of utilizing their own device(s).
For the company it becomes more of a money saver. Most companies see it as a great way to budget themselves compared to paying for hardware. (essentials of MIS, 2012, pp. 186-188) Although J.P. Shim thinks of this as a great idea to have personal devices as an option to operate in a workplace there are others that think otherwise. One person that doesn’t quite agree with Shim theory on BYOD is Bill Morrow, Morrow believes that theirs to much of a risk with respect to security and the information being access. He stated that the ability to control and secure the corporation’s data can be a lot more difficult, in his defense he refers to companies and organizations like hospital, banks, and all the other companies that carry sensitive information, not only within the business but with their clientele. He also stated that with the new policy it would be nearly impossible to keep up with the everyday updates. (Morrow, 2012) Cloud computing and Software as a Service also known as (SaaS) offerings, and the Bring Your Own Device (BYOD) phenomenon, means that the employees, business partners and customers are increasingly accessing information using a web browser on a device not owned or managed by the organization. The increase in web applications, cloud computing and Software as a Service (SaaS) offerings, and the Bring Your Own Device (BYOD) phenomenon are driving employees, business partners and customers to increasingly access information on devices that are not managed by IT departments.
Despite the fact that BYOD could be a cost-sparing measure for various affiliations and associations, it could likewise be extremely extensive with regards to overseeing different stages as for security which is the reason a few associations and affiliations decide to forgo changing their security conventions to such, because of the thought of how delicate the data is inside the association. constraining hazard and the all-inclusive prologue to mechanized risks and information breaks, because of these conditions numerous associations decrease any utilization of individual gadgets to play out their undertaking in the association. Another significant reality is that BYOD is still generally new and can open the association to higher security dangers. Employees must understand how sensitive the information they gain is and how much of an impact it can have in the organization whether it’s internal or external. Those who are in charge of the security aspect of these affiliations must also keep in mind of how serious their role is in the company. There are many important components to take to account when it comes to the BYOD phenomenon. The components that will be covered are the advantages and disadvantages and how do they contribute in the 21st century.
Overview of BYOD
BYOD is a trend that organizations are being forced to accept and work around with. The consumer’s attraction to their personal devices pushes companies to find ways to address the use of these personal devices in the workplace. In this day and age, the question is no longer if we Need to implement a BYOD strategy it’s how we are going to implement the strategy. In the study of (bring your own anything), (Eddy,2013) found that “67.8 percent of smartphone-owning employees use theirs for work, 15.4 percent of those do so without the IT department's knowledge, and that 20.9 percent of those do so in spite of an anti-BYOD policy. (Eddy, 2013)” This proves that huge quantities of representatives already having smart technology, most companies see this as a chance to execute innovation without paying for the devices themselves.
Although BYOD could be viewed as a cost-sparing measure for various associations and enterprises, it could really be expensive because of the trouble of overseeing different managing platforms. Some significant corporations and associations decide to abstain from changing their security protocols and migrate to BYOD because they would prefer not to chance the risk of cyber dangers and data information breaches. Another significant motivation behind why a few partnerships abstain from changing to BYOD is on the grounds that it is still generally new and presents for various security dangers, from an information security perspective, which could be found in the devices or even in their applications. Employees worry about the security that should be considered. Accordingly, organizations face various of questions when preparing a BYOD policy. They must think about what to choose which network a given device is allow on it. Device enrollment, licensing evaluation, security policy, and compliance, education, and security training are other major considerations. There are a few promising trends, pros, and cons with respect to BYOD.
There are many advantages that come with BYOD whether it’s from an facilitates employee’s standpoint or an organization standpoint. Studies have shown employee’s functionality are enhanced when a company allows the use of personal devices in a workplace. The functionalities may range from accessing corporate documents, applications, e-mails, e-mails, and network etc.
At Intel, the BYOD trend began in 2009, when workers started utilizing their own advanced cells, tablets and portable storage gadgets at work. The organization embraced the trend in order to reduce expenses and improve profitability. “Since Jan. 2010, the quantity of worker claimed cell phones at work has significantly increased from 10,000 to 30,000, and by 2014 Intel CISO Malcolm Harkins expects that 70 percent of Intel's 80,000 representatives will utilize their very own gadgets for in any event an aspect of their responsibilities.” (Afreen, 2014) The concept first entered into the corporate scenario when Intel recognized the importance of employees using their own devices for accessing corporate resources and network. But it was only until 2011 when IT service providers like Unisys and software vendor like Citrix Systems shared their views and perceptions about this emerging trend, organizations started considering it.
An employee seems to be highly dependent upon using any of their portable devices be it laptop, iPad, smart-phone or even a USB stick for their work purpose just because they find their devices much cooler than those provided at their cubicles or desk in an organization. By which we understand that to be competitive in the market, organizations need to facilitate any kind of technological advancement at the end user side which are their employees, but not compromising with the security of corporate information and privacy of end user. (Afreen, 2014) Intel came up with the following advantages in their worksite: Increased productivity, boost in control, security enhancement. Feeling flexible, and financial savings. The increased in productivity was found when employees use their own devices and typically respond faster to communication and also be available for a greater percentage of the day. Employees are also often both more comfortable and happier when working on their own technology. As for the boost in control: There were fewer unauthorized devices on the network because those personal devices wore encouraged. Security enhancement: The chance to respond to and recover from security issues is boosted by the fact that those devices are mobile. Feeling flexible: Employee satisfaction had been lifted because they were able to work with increased flexibility. They didn’t need to carry two devices and they had access to their data whenever and wherever they wanted. Financial savings: From reducing costs on device maintenance, software licensing and hardware expenditure, small and medium businesses no longer had to manage a second device for employees. It could also be argued that employees are more likely to take better care of their own devices.
Intel came up with these the following disadvantages and threats: Employee costs, device issues and security issues. For the employee cost it took away from the business, they are put on to the employee and indeed not every employee will have the latest technology in their possession or even want it. Being told by a company that you need the latest device could be off-putting; as well as the fact that employees may face maintenance costs or other repairs. For the device issues the technology for your employees and you are sure that it will carry all of the technological features your business needs.
However, if employees use a plethora of different devices with contrasting operating systems and capabilities then there could be a host of issues, and lastly for the security advantages to having mobile devices, perhaps the biggest issue with BYOD is the potential security problem. Whereas a company can invest in protection for its data and anti-virus systems for in-house technology, everyday security is threatened if employees don’t have the same protection on their own devices. Indeed, should an employee choose to leave a company then there is a significant risk that they will maintain access to a company’s key data at the touch of a button. The risk also expands to employees too: they may feel their own data is at risk by being linked to company systems. (wong, 2012)
Intel arranged their best to make it unmistakable to their workers that in the event that they mean to exploit the idea of that the BYOD strategy permits then they should be totally mindful and willing to following all parts of the approach which is affirmed with marks and sign offs. They additionally ensured they addressed every one of their workers, arranged the understandings, examined the innovation part of their assets and what is required and increasingly significant the security that must be held. Coming up next is a rundown of visual cues taken directly from an article on intel.“
- Employee costs: While the costs are taken away from the business, they are put on to the employee – and indeed not every employee will have the latest technology in their possession or even want it. Being told by a company that you need the latest device could be off-putting; as well as the fact that employees may face maintenance costs or other repairs.
- Device issues: Provide the technology for your employees and you are sure that it will carry all of the technological features your business needs. However, if employees use a plethora of different devices with contrasting operating systems and capabilities then there could be a host of issues.
- Security issues: While there are security advantages to having mobile devices, perhaps the biggest issue with BYOD is the potential security problem. Whereas a company can invest in protection for its data and anti-virus systems for in-house technology, everyday security is threatened if employees don’t have the same protection on their own devices. Indeed should an employee choose to leave a company then there is a significant risk that they will maintain access to a company’s key data at the touch of a button. The risk also expands to employees too: they may feel their own data is at risk by being linked to company systems.” (www.arrkgroup.com, 2014)
The concepts of BYOD continue to grow and enter other areas of technology that are influenced by the users (i.e. employees). BYOD is about who controls the device. The device is just a platform where the user accesses applications that can be used to provide specific services to meet the user’s needs. Beyond the purchase of devices, the responsibility to purchase applications can also be put on the employee as long as the services to be selected from. Managing and enforcing a BYOD strategy and operational plan in enterprises is crucial. A compromise or lack of compliance can have far reaching impact. The rapidly changing IT landscape require solutions that deliver visibility and insight that assist organizations to make informed decisions, create reliable action plans, and monitor ongoing progress. In spite of the fact that BYOD could be seen as a cost-saving measure for different affiliations and endeavors, it could truly be costly a result of the issue of directing diverse overseeing stages. Some noteworthy companies and affiliations choose to keep away from changing their security conventions and move to BYOD in light of the fact that they would incline toward not to risk the danger of digital perils and information data breaks. Workers must see how delicate the data they gain is and the amount of an effect it can have in the association whether it's inner or outer. The individuals who are responsible for the security part of these affiliations should likewise remember of how genuine their job is in the organization. There are numerous significant segments to consider with regards to the BYOD marvel. Like those that were discussed whether they are benefitable or risk sensitive.
Cite this Essay
To export a reference to this article please select a referencing style below