- Welcome Guest |
- Publish Article |
- Blog |
- Login
When it comes to the use of mobile devices in an organization, experts’ opinions are divided between organization owned devices and employee-owned devices. While it is irrefutable that both have their own pros and cons, employee-owned devices pose slightly more risks compared to the other option.
Employee owned devices, better referred to as BYOD (bring your own devices) presents an economic option for organizations as they can benefit from absorbing high-end and latest devices in the organization, without incurring any additional cost. BYOD presents the opportunity of being exposed to various technologies and systems, while organization-owned devices can be more monotonic in nature.
The pros of BYODs
BYODs like smartphones, PDA, and tablets, provide improved mobility to employees, as they can access their device anytime and anywhere, while this could be an issue with organization owned devices. With enhanced mobility and cloud computing, it becomes easier for an employee to work and update from any geographical location.
While everything seems hunky-dory with using BYODs, every matter pertaining to devices that access any of the organization’s apps and programs boils down to one thing – security.
How insecure are BYODs?
Security and information protection is a major concern for every organization that practices a BYOD policy. The first and foremost loophole in the security policies regarding employee devices is that very few, if any, organizations have robust security measures in place. Monitoring an employee owned device, especially after it leaves the office premises is almost impossible. However, the device can continue to have access to the organization’s apps and information.
Cloud computing, which is the latest trend, has made it even more difficult for organizations to monitor or restrain the accessibility of BYODs. The security implications of BYODs are many. Since BYODs have access to the organization’s computer system, it is easy to download and misuse/ exploit the information.
Another problem that organizations can face with BYODs is when, in case, the device is stolen. Tracking the device becomes difficult as only the device owner has a say in it. Moreover, since the device rights are not with the organization, it is almost impossible to ban the device’s accessibility. In such cases, it is possible that a hacker can use the device to gain easy and free access to the company’s data, masquerading as a genuine user. In such a case, the critical data can be seriously compromised.
How can BYODs be monitored?
The only possible solution for organizations allowing BYOD is to give limited access, depending on the role and position of an employee in an organization. Even though this is not a full-proof solution, this is the best any organization can do. Another way out is to get the employees to sign a contract, enlisting the safety policies they are bound to follow.
Article Views: 1338 Report this Article