{"id":169,"date":"2015-04-20T19:53:54","date_gmt":"2015-04-20T19:53:54","guid":{"rendered":"http:\/\/client3.g2bsclient.com\/?p=169"},"modified":"2015-08-04T09:30:27","modified_gmt":"2015-08-04T13:30:27","slug":"byod-is-here-is-your-company-ready","status":"publish","type":"post","link":"https:\/\/turinasbird.com\/2015\/04\/20\/data-security\/byod-is-here-is-your-company-ready","title":{"rendered":"BYOD Is Here: Is Your Company Ready?"},"content":{"rendered":"
\n\t<\/a>\n\t<\/a>\n\t<\/a>\n\t<\/a>\n\t<\/a>\n<\/div>

\"BYOD<\/a>When it comes to BYOD, the conversation has clearly shifted. No need to ask whether to allow employees to use personal devices at work; they\u2019re already doing that with or without your permission. The question is how to harness this fast-growing phenomenon while mitigating its risks.<\/p>\n

<\/p>\n

Millennials\u00a0Drive the Conversion to BYOD<\/strong><\/p>\n

According to a 2014 Gartner study, 40% of US employees working for large companies use personally owned devices for work purposes. In addition, a recent CompTIA survey found that six out of ten workers in their 20s and 30s used a personal device or app for work. Because by 2015 millennials will make up the largest segment of the workforce, expect the number of workers using their personal device at the office to skyrocket.<\/p>\n

Companies fighting to hire millennials should keep these factors in mind. According to CompTIA, three out of four men ages 20 to 49 consider a potential employer\u2019s level of tech-savvy a significant factor in choosing to work there and, as digital natives, they expect flexibility of choice and location, and are looking for employers who understand that their comfort and creativity in this area is a strength to be harnessed.<\/p>\n

Advantages of BYOD<\/strong><\/p>\n

No doubt, millennials are onto something.\u00a0\u00a0 More and more employers are bowing to the inevitable pull of BYOD and with good reason. There are in fact a lot of advantages for the employer.\u00a0\u00a0 The first and most obvious advantage of BYOD from a corporate perspective is cost savings which comes in many forms. Most obvious, of course, is that the employer no longer has to purchase 100% of the employees\u2019 device. Less obvious although not insignificant, BYOD gets the Company and its IT department out of the procurement and hardware business. This can lead to great economies in terms of time spent on product selection, contract negotiation and product support. Moreover, as employees are better able to seamlessly work outside of the traditional office, some companies are also able to find increased savings in real estate costs.<\/p>\n

BYOD also offers the promise of increased productivity. Workers can now work from the soccer field, from the doctor\u2019s waiting room, and during their night out on the town. Because they need not be glued to their desk or have a stack of papers with them, the opportunity for flexibility should, at least in theory, lead to increased efficiencies.<\/p>\n

But\u2026.Be Careful!<\/strong><\/p>\n

With the benefits of cost savings and increased productivity, come risks, especially those related to data loss and security breach. \u00a0With the average data breach costing organizations $3.5 million and the average cost per record lost increasing each year, this risk can\u2019t be understated.<\/p>\n

While security risks can\u2019t be completely eradicated, an organization with a well-thought out, well communicated, and well-enforced BYOD policy, is better positioned than one that ignores the fact that personal devices are used for work. The creation of this kind of policy requires interdisciplinary input from IT, human resources, legal compliance and employees. \u00a0Gone are the days of the company mandated blackberry. Your team will have to be prepared to work with phones, ipads, laptops, and perhaps watches. The devices in each category may vary and there is no predicting where your employees will be working. With this in mind, some items to consider when building a BYOD policies are as follows:<\/p>\n

    \n
  1. Make sure antivirus and malware protection has been installed and that your IT department can and does keep it updated.<\/li>\n
  2. Help employees avoid the risks of open wifi environments through desktop virtualization, accessed through SSL VPN.<\/li>\n
  3. Require employees to have passwords and pins and to report missing or stolen devices.<\/li>\n
  4. Make sure there is an autolock after a certain number of failed access attempts<\/li>\n
  5. Ensure corporate data is kept separate from personal data through containerization.<\/li>\n
  6. Maintain an ability to wipe corporate data, disable printing, and access to storage remotely if device is lost or an employee is terminated.<\/li>\n
  7. Keep corporate data encrypted<\/li>\n
  8. Maintain backups of corporate data contained on personal devices<\/li>\n
  9. Make support easy and available<\/li>\n
  10. Make sure there is a method to quickly communicate threats<\/li>\n
  11. Ensure that your program has continuous and frequent training and that you have obtained clear, written consent from each employee.<\/li>\n<\/ol>\n

    Finally, it is important to remember that creating a BYOD policy is only a starting point. Keeping your work force educated and vigilant is an ongoing process. In addition, as technology changes new issues will arise and new solutions may have to be implement. A successful BYOD policy evolves with these changes and with its workforce. There are risks. However, BYOD done right should be a win for employees and corporations alike.<\/p>\n","protected":false},"excerpt":{"rendered":"

    When it comes to BYOD, the conversation has clearly shifted. No need to ask whether to allow employees to use personal devices at work; they\u2019re already doing that with or without your permission. The question is how to harness this fast-growing phenomenon while mitigating its risks.<\/p>\n","protected":false},"author":3,"featured_media":170,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":[],"categories":[8],"tags":[15,14,16,11],"yoast_head":"\nBYOD Is Here: Is Your Company Ready? | Turinas & Bird, LLC<\/title>\n<meta name=\"description\" content=\"Millenials drive the converstion to BYOD, Advantages of BYOD, But \u2026 Be careful! Creating a BYOD policy is only a starting point. Keeping your work force educated and vigilant is an ongoing process.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/turinasbird.com\/2015\/04\/20\/data-security\/byod-is-here-is-your-company-ready\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"BYOD Is Here: Is Your Company Ready? | Turinas & Bird, LLC\" \/>\n<meta property=\"og:description\" content=\"Millenials drive the converstion to BYOD, Advantages of BYOD, But \u2026 Be careful! Creating a BYOD policy is only a starting point. Keeping your work force educated and vigilant is an ongoing process.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/turinasbird.com\/2015\/04\/20\/data-security\/byod-is-here-is-your-company-ready\" \/>\n<meta property=\"og:site_name\" content=\"Turinas & Bird, LLC\" \/>\n<meta property=\"article:published_time\" content=\"2015-04-20T19:53:54+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2015-08-04T13:30:27+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/turinasbird.com\/wp-content\/uploads\/2015\/04\/BYOD.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"500\" \/>\n\t<meta property=\"og:image:height\" content=\"421\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Alice Turinas\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Alice Turinas\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"4 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/turinasbird.com\/2015\/04\/20\/data-security\/byod-is-here-is-your-company-ready\",\"url\":\"https:\/\/turinasbird.com\/2015\/04\/20\/data-security\/byod-is-here-is-your-company-ready\",\"name\":\"BYOD Is Here: Is Your Company Ready? | Turinas & Bird, LLC\",\"isPartOf\":{\"@id\":\"https:\/\/turinasbird.com\/#website\"},\"datePublished\":\"2015-04-20T19:53:54+00:00\",\"dateModified\":\"2015-08-04T13:30:27+00:00\",\"author\":{\"@id\":\"https:\/\/turinasbird.com\/#\/schema\/person\/d44033fd481ab5aa097b9236d6d3fa4b\"},\"description\":\"Millenials drive the converstion to BYOD, Advantages of BYOD, But \u2026 Be careful! Creating a BYOD policy is only a starting point. Keeping your work force educated and vigilant is an ongoing process.\",\"breadcrumb\":{\"@id\":\"https:\/\/turinasbird.com\/2015\/04\/20\/data-security\/byod-is-here-is-your-company-ready#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/turinasbird.com\/2015\/04\/20\/data-security\/byod-is-here-is-your-company-ready\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/turinasbird.com\/2015\/04\/20\/data-security\/byod-is-here-is-your-company-ready#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/turinasbird.com\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"BYOD Is Here: Is Your Company Ready?\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/turinasbird.com\/#website\",\"url\":\"https:\/\/turinasbird.com\/\",\"name\":\"Turinas & Bird, LLC\",\"description\":\"Strategic Counsel for Cloud Based Technology Companies & Expansion\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/turinasbird.com\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-US\"},{\"@type\":\"Person\",\"@id\":\"https:\/\/turinasbird.com\/#\/schema\/person\/d44033fd481ab5aa097b9236d6d3fa4b\",\"name\":\"Alice Turinas\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/turinasbird.com\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/be1f267aa2d272dd040087cd631999ce?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/be1f267aa2d272dd040087cd631999ce?s=96&d=mm&r=g\",\"caption\":\"Alice Turinas\"},\"url\":\"https:\/\/turinasbird.com\/author\/alice-turinas\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"BYOD Is Here: Is Your Company Ready? | Turinas & Bird, LLC","description":"Millenials drive the converstion to BYOD, Advantages of BYOD, But \u2026 Be careful! Creating a BYOD policy is only a starting point. Keeping your work force educated and vigilant is an ongoing process.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/turinasbird.com\/2015\/04\/20\/data-security\/byod-is-here-is-your-company-ready","og_locale":"en_US","og_type":"article","og_title":"BYOD Is Here: Is Your Company Ready? | Turinas & Bird, LLC","og_description":"Millenials drive the converstion to BYOD, Advantages of BYOD, But \u2026 Be careful! Creating a BYOD policy is only a starting point. Keeping your work force educated and vigilant is an ongoing process.","og_url":"https:\/\/turinasbird.com\/2015\/04\/20\/data-security\/byod-is-here-is-your-company-ready","og_site_name":"Turinas & Bird, LLC","article_published_time":"2015-04-20T19:53:54+00:00","article_modified_time":"2015-08-04T13:30:27+00:00","og_image":[{"width":500,"height":421,"url":"https:\/\/turinasbird.com\/wp-content\/uploads\/2015\/04\/BYOD.jpg","type":"image\/jpeg"}],"author":"Alice Turinas","twitter_card":"summary_large_image","twitter_misc":{"Written by":"Alice Turinas","Est. reading time":"4 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/turinasbird.com\/2015\/04\/20\/data-security\/byod-is-here-is-your-company-ready","url":"https:\/\/turinasbird.com\/2015\/04\/20\/data-security\/byod-is-here-is-your-company-ready","name":"BYOD Is Here: Is Your Company Ready? | Turinas & Bird, LLC","isPartOf":{"@id":"https:\/\/turinasbird.com\/#website"},"datePublished":"2015-04-20T19:53:54+00:00","dateModified":"2015-08-04T13:30:27+00:00","author":{"@id":"https:\/\/turinasbird.com\/#\/schema\/person\/d44033fd481ab5aa097b9236d6d3fa4b"},"description":"Millenials drive the converstion to BYOD, Advantages of BYOD, But \u2026 Be careful! Creating a BYOD policy is only a starting point. Keeping your work force educated and vigilant is an ongoing process.","breadcrumb":{"@id":"https:\/\/turinasbird.com\/2015\/04\/20\/data-security\/byod-is-here-is-your-company-ready#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/turinasbird.com\/2015\/04\/20\/data-security\/byod-is-here-is-your-company-ready"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/turinasbird.com\/2015\/04\/20\/data-security\/byod-is-here-is-your-company-ready#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/turinasbird.com\/"},{"@type":"ListItem","position":2,"name":"BYOD Is Here: Is Your Company Ready?"}]},{"@type":"WebSite","@id":"https:\/\/turinasbird.com\/#website","url":"https:\/\/turinasbird.com\/","name":"Turinas & Bird, LLC","description":"Strategic Counsel for Cloud Based Technology Companies & Expansion","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/turinasbird.com\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-US"},{"@type":"Person","@id":"https:\/\/turinasbird.com\/#\/schema\/person\/d44033fd481ab5aa097b9236d6d3fa4b","name":"Alice Turinas","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/turinasbird.com\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/be1f267aa2d272dd040087cd631999ce?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/be1f267aa2d272dd040087cd631999ce?s=96&d=mm&r=g","caption":"Alice Turinas"},"url":"https:\/\/turinasbird.com\/author\/alice-turinas"}]}},"_links":{"self":[{"href":"https:\/\/turinasbird.com\/wp-json\/wp\/v2\/posts\/169"}],"collection":[{"href":"https:\/\/turinasbird.com\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/turinasbird.com\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/turinasbird.com\/wp-json\/wp\/v2\/users\/3"}],"replies":[{"embeddable":true,"href":"https:\/\/turinasbird.com\/wp-json\/wp\/v2\/comments?post=169"}],"version-history":[{"count":0,"href":"https:\/\/turinasbird.com\/wp-json\/wp\/v2\/posts\/169\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/turinasbird.com\/wp-json\/wp\/v2\/media\/170"}],"wp:attachment":[{"href":"https:\/\/turinasbird.com\/wp-json\/wp\/v2\/media?parent=169"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/turinasbird.com\/wp-json\/wp\/v2\/categories?post=169"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/turinasbird.com\/wp-json\/wp\/v2\/tags?post=169"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}