Can BYOD And Cyber Security Actually Coexist?

Is It Worth Having BYOD?

Add bookmark

Steven Lerner
07/09/2019

We respect your privacy, by clicking "Download Your Copy" you will receive our e-newsletter, including information on Podcasts, Webinars, event discounts, online learning opportunities and agree to our User Agreement. You have the right to object . In addition, you agree to having your details passed onto the sponsor who may promote similar products and services related to your area of interest subject to their privacy policy. For further information on how we process and monitor your personal data click here. You can unsubscribe at any time.

It is no coincidence that as the number of mobile security incidents increased in the past few years, so did the adoption of personal devices in the enterprise. Bring your own device (BYOD) policies allow employees to use their own personal devices to access company apps and data. However, this comes with immense security risks.

“First, if you don’t control what devices BYOD users can bring, there will be many flavors that may not be up to the level of security you demand,” said Jack Gold, president and principal analyst with J. Gold Associates. “Second, with BYOD, there is often a blending of personal and enterprise data, which causes privacy and security concerns as companies try to manage the device settings and user profiles.”

The inability to control devices owned by employees could result in more data leakage, malware infections, malicious mobile apps, and other security incidents. The lack of visibility into the mobile devices and the inability to control downloads is enough to make an enterprise reject BYOD.

Despite the security risks, there are many benefits for the employer and employee. The advantages of BYOD include improved employee satifaction, higher productivity, and lower mobility costs.

Enterprise Mobility Exchange surveyed its audience in June 2019 , and 71% of respondents said that it is possible to overcome security challenges in a BYOD environment.

Download this report to learn:

  • What are the biggest security risks with BYOD?
  • Is BYOD worth the risk?
  • How Walmart, the State of Nebraska, and other organizations are achieving a secure BYOD environment

RECOMMENDED