Top

The Growing Use & Risk of Employee Personal Devices for Work

A 2013 Mozy and Compass Partners survey found 87 percent of small and medium businesses had no plan in place regarding the growing use of employees’ personal devices for work, a trend commonly known as BYOD, or Bring Your Own Device. Most of these businesses— 80 percent, the study found— did not see this as an area of concern, The Huffington Post reports. With no formal plan in place regarding the use, back up and safety of personal devices, small business data is at great risk of being lost.

BYOD Policy: Why It Matters

If employees use their own devices when working from home, you don’t know when and where they’re using them. Maybe they’re working diligently in their home offices. Or maybe they’ve gone to the public library or a coffee shop and don’t think twice before leaving that laptop unattended during a bathroom break. This leaves employee technology vulnerable— and your business on the hook for lost data. If the device is stolen, you risk losing the only copies of important documents and losing control of client and enterprise information.

While a tech-savvy IT department might simply wipe the device remotely to prevent massive data leaks, this move now risks legal liability. Lawsuits filed over such remote actions second the need for BYOD policy.

What’s Really at Stake

In essence, BYOD poses two risks: The risk of losing data due to accident or device failure, and the risk of leaking data via theft. The first problem can be solved by a BYOD policy that addresses data storage, backup and recovery. Cloud-based online backup offers an elegant solution to the issue of data storage and management. These systems allow employees to easily back up data for access control and authentication that safeguards company data, while allowing employees easy access to data from any device at any time. SBA.gov suggests automating external backups for ease of implementation.

To address the risk of data security, a BYOD policy must spell out what control IT has over devices, if any. A policy that addresses what program, apps or files IT has the ability to remotely wipe, restrict, or block access to if a threat arises protects employees, enterprise data and client information.

The array of device options can become a roadblock for policy. With Android smartphones alone, employees could have any of 20 versions floating around. This makes the technology a greater perceived risk. Policies can list what devices are and are not supported under BYOD. Just because an employee has a BlackBerry or Samsung smartphone doesn’t mean the device meets security protocols set by the organization.

To ensure policy implementation, implement an authentication program that forces employees to request permission to access enterprise apps from their devices. While employees may protest about logging in each time they go to view files or use programs, this prevents third parties from accessing the information if they do gain the devices.

Failure to address BYOD policy now leaves businesses vulnerable. SBA.gov says 40 to 60 percent of businesses don’t recover from data-loss disasters. Don’t let this happen to your business on account of lax device security.

Does your business have BYOD policies in place? Share them in the comments.

Contributed by Connie O’Hare. Connie operates a small tech company from her East Coast home, and takes every opportunity she can to take her kids on memorable vacations around the world.


Comments

  • Lawrence I Lerner
    August 1, 2013

    Embrace BYOD but have a plan! Great posting. With more software companies providing services in the cloud, it can be a very cost effective way for any business to provide service to full or part time employees without having to manage the overhead of endpoint devices.

    Business and end users are no longer satisfied with the speed of deployments or the choices in technology. With consumer technologies such as tablets and smartphone out evolving what could be reasonably put on a corporate desktop it’s not a great leap to see why end-users are rapidly in a BYOD (Bring Your Own Device) mindset. That model is soon to be replaced by a BYOX, where X is anything from productivity software (e.g., Google Apps) or personal mobile hotspots. Users become more self-sufficient and the infrastructure cost to maintain are borne by someone else.

    How you chose to grant access is up to you. Setting yourself up properly with a plan and the right access can be managed in a few short hours each month.

Post a Comment

Disclaimer

This blog accepts forms of cash advertisements, sponsorship, paid insertions or other forms of compensations. While we may receive commissions when you click on some of our links and make purchases, this does not impact our reviews, comparisons, opinions or thought-leadership perspectives. Please note we also welcome contributed content and there may be links that are affiliate oriented within these contributions, as well. Retail Minded always aims to deliver trusted news, education and support for our readers.

Read More about our Privacy Policies

AS SEEN IN...

Retail Minded on Entrepreneur
Retail Minded on Fiverr
Retail Minded on Forbes
Retail Minded on Gift Shop
Retail Minded on LRG
Retail Minded on Museum and More
Retail Minded on NBC
Retail Minded on Party Paper
Retail Minded on today