BYOD is Dead – Long Live CYOD!

Sep 11, 2015 | Uncategorized

CYOD Vending MachineFew people would argue the benefits of BYOD.

When employees are allowed to bring their own computers and smart devices to work, it saves their employers having to buy and maintain the devices and infrastructure needed to support them, creating happy, productive employees who use the technology they know and love.

And yet, according to a study by CompTIA, companies are ditching BYOD as their primary device acquisition model. In 2015, 53% of companies surveyed said they weren’t using BYOD – quite a spike from the 34% of 2013.

What’s emerging is that most companies tend to get tripped up on the legal and financial complexities of BYOD. Many don’t fully consider its impact on compensation, for example – how does the employee get paid for work done on the phone? What about pay for work on it after hours?

What’s more, the answers will differ hugely for different jurisdictions. With the adverse business climate for BYOD in Europe (complex regulation, unfavorable tax regime and high mobile data cost) many employers provide laptops, cellphones and even cars to employees in selected countries.

Nor are European workers happy to pay for BYOD: only 6% of employees say they’d cover the entire cost of a terminal dedicated exclusively to their professional activity, while only 18% are willing to finance part.

But the real issue with BYOD is the enforceability of security policies. Keeping a BYOD fleet secure is quite simply nearly impossible.

Most devices contain or give access to proprietary enterprise information. According to Gartner, one in four business users surveyed admit to having a security issue on their private device. And according to Osterman Research, 15 percent of employees believe they have “none to minimal” responsibility to protect corporate data stored on their personal device.

Happily, all these issues are adequately addressed by an evolutionary off-shoot of BYOD – choose-your-own-device (CYOD). Allowing employees to choose between pre-approved devices, CYOD makes concessions for user choice without sacrificing enterprise control.

And make no mistake; a degree of choice is very important. European professionals expect their companies to provide more innovative devices: only 46% of them are happy with the tools given them to do their work, while 70% are very satisfied with the technology they use at home.

Some IT managers provide iOS devices to satisfy the new generation of Apple fans. To be sure, the vendor’s claims of security by design make its devices worthy of consideration. But whatever the platform, CYOD gives IT departments the opportunity to pre-install security software and set up administrator, firewall and network settings. Companies are thus better positioned to provide thorough support to a limited number of devices.

To avoid getting tripped up on CYOD, companies should focus on effective implementation that blends security and flexibility.

Tip 1: At the very least, balance user desires with productivity. Offer enough variety – especially if the organization is shifting from a BYOD culture – but test products exhaustively.

Tip 2: Plan and ready yourself for CYOD with a comprehensive mobile protection strategy. Focus on active defense methods, characterized by a risk-based approach to security management versus incident response. Pick a best-of-breed data loss prevention product that integrates well into your mobile product and supports your strategy.

Tip 3: Assemble the right team. Mobile projects should include members from IT, legal, HR, security operations and the business. Ensure that members of the IT team who solve mobile problems clearly understand the objectives.

CYOD provides the right mix between the old and the new to satisfy everyone and be the mega trend BYOD promised to be but never was.

Recent Posts

Cloud Use Cases for Small and Growing Businesses

Cloud Use Cases for Small and Growing Businesses

As you may have heard, the cloud is a network of remote servers hosted on the Internet. But for businesses the world over, the cloud represents the next step in technological evolution. The cloud unlocks speed, flexibility, scale, and cost savings that businesses of...

2023 Cybersecurity Trends for Small Business

2023 Cybersecurity Trends for Small Business

The threat of cybercrime continues to grow each year, and small businesses are particularly vulnerable. The latest cybersecurity trends indicate that organizations of all sizes must remain vigilant in order to protect their valuable data.  In this article, we'll cover...

Security in a Co-Managed IT Environment

Security in a Co-Managed IT Environment

Security in a co-managed IT environment looks a little different than in a traditional environment. Don’t be alarmed. When leveraging a partner to co-manage your environment, you’ll actually have better, more robust security in most cases than if you were to manage...

Five Signs you Need Better IT Support

Five Signs you Need Better IT Support

IT systems can make or break any business. They provide an avenue for communication and collaboration, help with organizational efficiency, and drive improved customer service. Without proper IT support, businesses are often left in despair and experience hindering...

Co-Managed IT Services for Financial Services

Co-Managed IT Services for Financial Services

Financial services companies are faced with the challenge of keeping up with technology because they cannot sacrifice data security or compliance. As a result, more organizations are turning to co-managed IT services as an option that provides a balance between cost...

Co-Managed IT Services for Oil and Gas

Co-Managed IT Services for Oil and Gas

The Oil and Gas industry is an ever-evolving sector that operates in a highly competitive global market. Companies must stay ahead of the competition to remain profitable, which means keeping up with the latest technologies and trends. One way to do this is with...