Employers expand BYOD strategies in 2015
January 21, 2015
The rise of cloud computing in the digital workplace has led many employers to ask themselves the same question – what other ways can I streamline business operations? One of the most common responses is the adoption of a BYOD strategy. Much like the cloud, cyberattacks are the main impediment to further BYOD implementation. However, also like cloud computing, the advantages are plentiful and clear.
By devising a split-bill solution with employees, businesses are able to save plenty of money on infrastructure by encouraging the use of personal laptops, smartphones and tablets. These funds could then be allocated toward other parts of the business to help boost revenues. Employees are often just as enthusiastic as their superiors about a BYOD strategy because it provides them with the comfort of their own hand-selected device. This advantage could increase engagement and productivity throughout the work day. And as cybersecurity measures gradually improve, it will become an even larger part of the business world.
The gradual development of BYOD
FierceMobileIT reported that the expansion of 4G LTE networks in the past year has increased the demand for BYOD strategies. Its growth can be found across a wide range of sectors.
“Employees’ expectations around having the freedom to choose the type of device and operating system they use for work, as well as capability for fast, seamless delivery of content and information, continues to increase at a rapid pace due to device innovation and increasing 4G coverage,” wrote David Langhorn, head of corporate and large enterprise at Vodafone, according to the news outlet.
The void in security
A recent survey by EY found that 84 percent of businesses consider mobile security as a medium/high priority, according to IT Pro Portal. However, only 41 percent of the respondents said that they plan to increase their spending on preventing data breaches. The news outlet noted that the general disinclination for preventative measures could pose significant threats to a wide range of companies.
“With BYOD, these devices can easily make it into offices dealing with sensitive information and, due to the fragmentation of Android, providing sign-off for one type of device does not necessarily mean other devices will be configured in the same way,” Jahmel Harris, security consultant with MWR, told the news outlet. “With any BYOD environment, care should be made to perform checks on devices, where the OS version, installed apps and root status are checked first.”