Managing mobile devices and bring-your-own-device (BYOD) initiatives is a universal challenge for corporate IT administrators. Analyst firm IDC predicts that by 2019, nearly 2 billion smartphones will ship globally, with about 60% of them being used in a work environment in some fashion.
On the one hand, the trend towards BYOD seems unstoppable. Employees in organizations of all sizes are bringing phones, tablets and personal computers into the business work environment. Moreover, as the workforce continues to be transformed by the influx of Millennial workers, more and more business communications are taking place across applications outside of the traditional corporate IT orbit.
While it is nice for the business in that they typically won’t need to pay for all of the hardware or monthly services associated with personal devices, the security concerns and logistical challenges posed by managing all of these devices are very real. A single data breach can inflict huge costs in terms of both hard dollars and reputational impact.
More and more companies and IT managers are turning to BYOD policies as a way to help manage these competing needs. Roughly fifty percent of organizations today have formalized BYOD policies. A typical policy includes provisions for regular password updates, device timeout standards and lists of approved or prohibited applications for corporate use. Other companies are turning to endpoint security vendors such as Symantec, Intel, Trend Micro, Sophos and Kaspersky Labs to help manage this problem.
Perhaps it is time for your company to implement a BYOD policy.