Known as the Bring Your Own Device (BYOD) phenomenon, on one hand, there is an opportunity for greatly increased productivity and decreased costs. On the other, there are increased security risks, management issues and even data and device ownership and governance issues.
From the executive who purchased an iPhone to boost personal productivity to the college professor who redesigned curriculum to take advantage of new tablet applications, users in all types of organizations are bringing consumer devices to work and school.
When they do, each expects access to business and educational applications and content, not just the Internet. Whether this expectation is justified is a moot point in today’s world of hotspot-filled public spaces and high-bandwidth wireless home networks.
Compounding the problem, the ratio of users to devices has grown from 1:1 to as many as 3:1 in many cases. A single user today will interchangeably connect to the network with a Windows laptop, and possibly an iOS or Android smartphone or a tablet many times throughout the day.
For IT organizations, BYOD means supporting a variety of devices and their operating systems, while maintaining a high level of experience for the end user, regardless of whether the device is personally- or corporate-owned.
To keep costs low, it must be easy to securely onboard new devices and quickly identify and resolve problems. For users, BYOD means using the laptop or smartphone that works best for their needs. But, they must also understand support considerations and what happens when a device is replaced, lost or stolen.
By subscribing to our early morning news update, you will receive a daily digest of the latest security news published on Help Net Security.
With over 500 issues so far, reading our newsletter every Monday morning will keep you up-to-date with security risks out there.