Articles about BYOD

Secure BYOD, the BYOD way

BYOD key

Bring your own device (whereby employees work from personal devices like their mobile phones) is quickly becoming the norm in today’s business environment. Companies that embrace BYOD are able to give employees more freedom to work remotely, resulting in increased productivity, cost savings and talent retention. In fact, 85 percent of organizations now allow BYOD for at least some of their stakeholders, including employees, contractors, partners, customers and suppliers.

It is important to note that BYOD does change an organization’s threat landscape and requires security tools that are different than those that are used to protect managed devices. Unfortunately, a widespread misunderstanding about this point has contributed to an unfounded assumption that BYOD is inherently riskier than the traditional way of doing things. In reality, this is a myth fueled by companies that fail to implement proper security tools and processes for protecting data in BYOD environments. Consider the following findings from a recent report on BYOD and security:

Continue reading

85 percent of companies permit BYOD but security remains a concern

BYOD key

While a large majority of companies now permit employees to use their own devices for work, they have concerns over security and privacy.

Organizations are making BYOD available to employees (76 percent), contractors (27 percent), partners (25 percent), customers (22 percent), and suppliers (19 percent).

Continue reading

Personal devices are a major threat to mobile IT environments

personal devices

A new survey finds that 58 percent of respondents believe access to their network from non-corporate and personally owned devices such as laptops, desktops or mobile phones is the highest risk in managing remote users.

The study from trusted access specialist Duo Security shows that while the trend to remote working has created unmatched flexibility and helped organizations attract top talent globally, it has also introduced a major predicament for IT and security teams.

Continue reading

Shadow devices put enterprise networks at risk

Shadow IT

A new study finds that enterprise networks have thousands of shadow personal devices including laptops, tablets and mobile phones, as well as Internet of Things devices -- such as digital assistants and smart kitchen appliances -- connecting to them.

The report from network control company Infoblox shows 35 percent of companies in the US, UK and Germany reported more than 5,000 personal devices connecting to the network each day.

Continue reading

Cylance brings enterprise-grade security to employees' homes

Home protection

Businesses go to great lengths to protect their corporate networks, but when staff take work home it can be hard to ensure data is kept secure when using personal devices and accessing data from the cloud.

In an innovative move, endpoint protection company Cylance is offering employees of companies that use its software the chance to use Cylance's enterprise-grade AI-powered endpoint prevention to protect their family's home PCs and Macs against malicious attackers.

Continue reading

One in four organizations use only passwords to secure BYOD

BYOD key

Allowing employees to access corporate data via their own devices is increasingly popular, but it does present risks if not implemented correctly.

A new report from data protection company Bitglass finds one in four organizations do not have multi-factor authentication methods in place to secure BYOD -- a well-known enterprise security gap.

Continue reading

New technology platform helps secure business devices

Network security

Thanks to increased use of mobile and BYOD devices, there's a significant risk to business networks from un-managed and uncontrolled devices which could offer a route for security breaches.

Israeli startup company Axonius is looking to solve this problem with a new platform designed to eliminate blind spots on the network and provide a single place to understand, manage and control the security of all end user, compute and IoT devices.

Continue reading

Growth of BYOD proves it's no longer an optional strategy

If you study graphs related to the adoption rate of BYOD and BYOD spending, you’ll notice that it’s pretty steep. While growth may have been gradual from 2010 through 2014, adoption rates have skyrocketed over the last couple of years.

Enterprises and small businesses alike are finally realizing that BYOD is no longer an optional strategy if they want to remain competitive.

Continue reading

Managing BYOD: Best practices

BYOD is dying. It’s not that people no longer bring devices to work. It’s that everyone brings their devices to work. Whether you use BYOx (bring your own everything) to describe this phenomenon or some other term, there are important concerns to be addressed.

For example, will you be providing devices to all employees, some employees (e.g., managers and executives) or no employees? How will user-owned devices connect to the network and how do you ensure personal and corporate data separation? What about company-owned devices and who owns, and thus has free access to, the data stored on them? And what happens when a device with company data or the ability to connect to the company network is stolen?

Continue reading

Most employees use smartphones for private tasks during work hours

Smartphones, even personal ones, are no strangers to the workplace. With the increase in adoption of BYOD initiatives, more and more employees are using their smartphones for everyday job tasks.

However, according to a new report by LaptopsDirect.co.uk, British workers are also using personal smartphones for private communication, during work hours, as well.

Continue reading

Employees who embrace BYOD feel judged

There is a strange side-effect to the Bring Your Own Device initiative, and one that's slowing it down. Apparently, many employees refrain from bringing their own devices to work for the fear of being judged.

No, not because their devices are old or slow, but because others will think they're using them for personal instead of professional reasons.

Continue reading

How to take control of BYOD bandwidth use

The trend for increasing numbers of employees and customers bringing their own devices into a workplace can seriously impair a businesses’ access to the Internet.

The problem is that as more mobile devices connect to the network, a business can quickly discover that its cloud-based applications, payments systems, accounting, stock control, customer relationship management (CRM) and business applications have become hopelessly sluggish.

Continue reading

Could your BYOD system be a threat to your business?

Nowadays, practically everyone is connected to the Internet at home, in the office and on the move. This has introduced fantastic opportunities for businesses and employees to operate smarter. Bring Your Own Device (BYOD); the concept of allowing employees to work in the office or remotely using their own devices, rather than company owned, has been around for a while now and really makes the most of this 'personal device era'. It’s convenient for employees to use their own devices, reduces burden on IT admin and saves Capex costs for the business. But, could BYOD end up being the company’s biggest threat?

Employees now have the opportunity to use their own personal devices for work purposes. The thought behind this is that employees are already familiar with their own devices and already have them on hand at all times. BYOD is generally a good thing, but it is not without its challenges and concerns. Like any new development, the risks need to be evaluated. But, in theory, team members will be more productive and happier at work with a BYOD scheme in place.

Continue reading

Employees feel pressure to use personal devices for work

Of employees in the US who use their personal smartphones for work, 45 percent are required to do so by their employers and 55 percent do so voluntarily. However, of those voluntary users 42 percent feel pressured to use their phone for business use outside of work.

This is among the findings of a new survey by platform services company Syntonic which reveals mounting pressure on employees to use their personal devices for work even if not required by their employer.

Continue reading

New software simplifies BYOD management

BYOD key

The US mobile workforce is set to grow to 105.4 million workers by 2020 according to IDC and this creates a challenge for businesses trying to control and secure deployments.

In a bid to make things easier, networking solutions company Brocade is launching its latest Ruckus Cloudpath platform to enable IT organizations of any size to easily establish secure, policy-based access for wired and wireless devices.

Continue reading

© 1998-2024 BetaNews, Inc. All Rights Reserved. Privacy Policy - Cookie Policy.