{"id":179305,"date":"2018-02-05T10:29:00","date_gmt":"2018-02-05T15:29:00","guid":{"rendered":"https:\/\/www.ntegrait.com\/byod-in-the-workplace-pros-vs-cons\/"},"modified":"2024-02-06T13:28:51","modified_gmt":"2024-02-06T13:28:51","slug":"byod-in-the-workplace-pros-vs-cons","status":"publish","type":"post","link":"https:\/\/ntegrait.com\/byod-in-the-workplace-pros-vs-cons\/","title":{"rendered":"BYOD in the Workplace: Pros vs. Cons"},"content":{"rendered":"
Many modern companies are now implementing BYOD policies that permit employees to work with their personal laptops, tablets, and smartphones.<\/strong><\/p>\n Bring your own device (BYOD) to work. Who would have thought, even twenty short years ago, that you could use a little phone to do business instead of a big clunky computer? That\u2019s today\u2019s reality and tomorrow\u2019s norm. However, with this new wave of change in the workplace, there comes many risks and rewards to both employers and employees.<\/p>\n Bring your own device programs can be broken down into three important areas of review.<\/p>\n This is where things get tricky. You can create all the policies you want. Write them up and discuss them until you\u2019re blue in the face, but how do you truly enforce them? The answer is that you can\u2019t. You can\u2019t control what employees do even if they sign an agreement on usage. So, it stands to reason that you must be very careful when hiring employees. Trust is crucial. You must be able to count on your staff to do the right thing all the time.<\/p>\n Asking people to use their own devices certainly offers several advantages. It can lower company costs and improve efficiency and effectiveness. Mark Coates, a VP at Good Technology notes that \u201cBy enabling employees to securely and easily access corporate data on their own device, productivity levels will naturally increase. In terms of cost savings, there are huge benefits, since SMBs will not have to manage and fund a second device for employees\u201d.<\/p>\n Tony Bradley of PC World states that \u201cwhen companies embrace BYOD policies, they have advantages over competitors. Some of these advantages being lower costs to the company since employees already own these devices and employee satisfaction and familiarity with the devices. Obviously, they\u2019d rather use the devices they love rather than being stuck with laptops and mobile devices that are selected and issued by the IT department\u201d.<\/p>\n On the other hand, the obvious cons are trying to control private and sensitive information. Data breaches can and have occurred. Software and hardware are replaceable, but company data is not. In a BYOD workplace, organizations lose much of the control over the equipment and how it\u2019s used. After all, how do you tell an employee what they can and can\u2019t do with their own laptop or smartphone? Company-issued devices, on the other hand, are protected by company-issued security that is controlled by the IT department.<\/p>\n Advice is being offered to companies considering a BYOD policy via government guidelines. The US Department of Commerce\u2019s NIST, National Institute of Standards and Technology, has the following to say.<\/p>\n Teleworkers who use a BYOD desktop or laptop (PC) for telework should secure their operating system and primary applications. <\/strong><\/p>\n Securing a BYOD PC includes the following actions:<\/p>\n Teleworkers who use a BYOD mobile device for telework should secure it based on the security recommendations from the device\u2019s manufacturer.<\/strong><\/p>\n They go on to say, \u201cSensitive information, such as personally identifiable information (PII) (e.g., personnel records, medical records, financial records), that is stored on or sent to or from telework devices needs to be protected so that malicious parties cannot access or alter it. An unauthorized release of sensitive information could damage the public\u2019s trust in an organization, jeopardize the organization\u2019s mission, or harm individuals if their personal information has been released\u201d.<\/p>\n As you can see, a lot of thought needs to go into deciding whether this practice is right for your workplace. If you\u2019re still not sure, check out the link below for a detailed graphic checklist.<\/p>\n","protected":false},"excerpt":{"rendered":" Many modern companies are now implementing BYOD policies that permit employees to work with their personal laptops, tablets, and smartphones. Bring your own device (BYOD) to work. Who would have thought, even twenty short years ago, that you could use a little phone to do business instead of a big clunky computer? That\u2019s today\u2019s reality…<\/p>\n","protected":false},"author":5,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"inline_featured_image":false,"footnotes":""},"categories":[8],"tags":[],"class_list":["post-179305","post","type-post","status-publish","format-standard","hentry","category-blog"],"acf":[],"yoast_head":"\n<\/p>\n
\n
\n
\n