Skip to main content

Many organizations are adopting bring-your-own-device (BYOD) allowing employees to use their smart phones, tablets, and laptops for work. In the last few years, there’s been a spike in popularity and it’s become the norm for many industries. One of the reasons being ease of implementation as 77% of adults in America already own a smartphone.

Implementing BYOD:

#1: Eliminates the cost of having to buy devices and data plans- This is especially important for enterprise organizations.

#2: Provides employees with the latest technology- It takes years for employers to upgrade their devices and people tend to have newer models. Newer devices increase productivity thanks to the newest features.

#3: Erases the need for multiple devices- In the past, people would have both a personal and work cell phone that they’d have to keep track of.

#4: Doesn’t require a learning curve- People already know how to use their devices and are working with the system they prefer, such as iOS or Android.

CBS MoneyWatch stated that 67% of people are already doing this. So why haven’t more companies adopted this policy?

While BYOD offers many benefits, it also comes with its own set of problems- and security leads the pack. While hackers and ransomware are a definite threat, they’re not the biggest risk to businesses. Unfortunately, employees are error-prone and unpredictable. They may accidentally open a phishing email through their Gmail account or intentionally share confidential company information. Since the device isn’t owned by the company, it becomes increasingly harder to manage.

Some scenarios that may cause issue for the organization:

#1: Sales reps using their own devices and numbers. If they leave the company, that phone number goes with them whether they go to your competitor or not. This means prospects and clients may be reaching out to them, making the non-compete void as the sales person isn’t actively pursuing those accounts.

#2: Hourly employees checking their work emails on their smart phones after hours. Beware of legal issues associated with hourly workers and BYOD. Once the employee is off the clock, they’re not supposed to do any work- this includes checking emails.

#3: IT department providing end-user support. With no standard device or operating system, the IT department will have a harder time efficiently providing workers with support on their personal devices. It may be more of a headache as the device owner could need to reach out to their data provider.

#4: Deleting confidential company data from ex-employees’ personal devices. Employers can’t just start deleting personal files off someone’s personal computer, but they can’t just leave them on there either. Before implementing BYOD, an organization must have a policy in place stating how to secure and remove confidential information from personal devices.

Before implementing BYOD into your organization, weigh the pros and cons. If you decide it’s the right move for your company, download our BYOD policy.

Download Your Free Bring-Your-Own-Device Policy below!