If you’re like many businesspeople, you’re constantly identifying the trends with the most staying power that will benefit your company.
In addition to desktop computers, you probably already know the importance of mobile apps for your products to engage your customers on smartphones and tablets.
You also know your Web site has to be judged mobile friendly by Google or you risk losing your ranking.
So what have you decided about the use of mobile devices –bring your own devices (BYOD) – for your employees to use in the workplace?
There are pros and cons to consider, according to Newsweaver (www.newsweaver.com). Newsweaver describes itself as a global company providing innovative email solutions to internal communicators and email marketers.
The company cited these 2015 trends:
— Forty-one percent of employees do not believe that the tools their company provides actually meets their needs which is why they choose to “go rogue.”
— Three in four IT teams within an organization acknowledge that they are delivering outdated enterprise tools.
— Companies who want to retain more control of mobile adoption choose to implement enterprise apps which boost work productivity by over 34 percent.
– Forty-six percent of IT departments are not confident in their own mobile security systems effectiveness to protect company data.
Here’s a Newsweaver infographic:
From the Coach’s Corner, here are related articles:
Do BYOD Headaches Outweigh Benefits? Yes — More than half — 53 percent — of surveyed global businesses admit they’re not ready to defend against attacks on their employees’ bring their own device (BYOD) devices. Nearly all say their devices might have been attacked, according to a 2014 study.
4 Strategies for CEOs to Win Their Cyber Security Tug of War — The cyber security tug of war is never ending even though chief executive officers and board members now get the importance of protecting their companies’ information assets. They’ve learned to fear cyber-security threats because they could lose their jobs. If this is all true, why then are there incessant, worldwide cyber attacks?
How to Enhance Security in Your Company’s Wireless Network — Do you take it for granted that your wireless network is secure? Don’t make that assumption. Wireless routers present dangers. Your router is vulnerable to hackers and, hence, security issues. If you’re really serious about security, WIFI might not be for you. A wired network might be more desirable.
Identity Fraud Escalates in Smartphones, Social Media — Skyrocketing mobile malware threats amid widespread use of BYOD, bring your own devices, were on track for a $1.88 billion services market. That’s according to ABI Research. Cybercriminals are successfully attacking vulnerabilities in individual devices and networks to an ABI report.
Who Profits from Android’s Security Issues? Not Users — Countless headlines detail the cyber dangers of Android-based devices. It has to do with the apps.
4 Recommendations to Avoid Spending Too Much on IT — Despite an unprecedented trend to control information-technology costs, the majority of companies fail to achieve maximum savings, according to a multi-nation Forrester Consulting study.
“The real problem is not whether machines think but whether men do.”
-B. F. Skinner
Author Terry Corbell has written innumerable online business-enhancement articles, and is a business-performance consultant and profit professional. Click here to see his management services. For a complimentary chat about your business situation or to schedule him as a speaker, consultant or author, please contact Terry.
More than half — 53 percent — of surveyed global businesses admit they’re not ready to defend against attacks on their employees’ bring their own device (BYOD) devices. Nearly all say their devices might have been attacked, according to a 2014 study.
To make security matters worse, 55 percent aren’t doing anything to prepare for security attacks. The “2014 State of Security” study of global companies was conducted by a research firm, ITIC, and a security awareness training firm, KnowBe4.
Sixty-five percent of businesses are now part of the BYOD trend in which employees bring their own handheld technology to use at work. They use their hardware on sensitive company-owned databases, e-mail, file services and wireless networks.
The pro arguments: Companies save money by not having to buy the devices for their employees. Employees like it because they get to decide what apps to use at work, and they get to use their devices to check their personal e-mail and social media.
By 2016, the typical mobile-device owner will surf the Web six times and download 14 times more megabytes as they did in 2011, according to a March 2012 study.
All of this means the BYOD trend raises serious questions:
1. Too much demand on a company’s wireless networks. Experts say such use by the additional handhelds threaten to place too much demand on wireless networks.
2. Privacy and are in doubt at many companies. Many businesses have privacy challenges complying with the payment card industry (PCI) and Health Insurance Portability and Accountability Act (HIPAA). Enforcing PCI and HIPAA policies are more difficult with devices not owned by the company.
Consider this alarming HIPAA topic: Lesson about Passwords after Theft of 16,000+ UCLA Patient Records.
3. Security of personal devices connected to your enterprise network is questionable. That’s why many information security professionals derisively refer to BYOD as “bring your own disaster.” Many companies are joining the BYOD trend, but they’re forgetting about security.
Such fears were confirmed in an Onforce poll: “Businesses Allow More Personal Tech But Overlook Security.” The poll featured the opinions of more than 500 IT professionals. More than 50 percent of respondents say there’s been a 25 percent increase in setting up personal handhelds. Just 31 percent say they’ve been asked to implement security for the handhelds.
Staying on top of the dynamic changes – new types of technology – creates overwhelming pressure on IT professionals. It’s a hardship on the techs in workloads and expenses.
Further, Apple products are used most frequently as BYODs. But Apple devices aren’t nearly as secure as a myth indicates.
Given the massive cyber attacks on business, BYOD also creates unnecessary headaches.
From the Coach’s Corner, more security food for thought:
- Cyber Security: Is Your Business Prepared with Precautions and Response Philosophy?
- Identity Fraud Escalates in Smartphones, Social Media
- Internet Criminals to Pose Bigger Threat than Terrorists – FBI
- 5 Safety Measures to Thwart Mounting Social-Network Attacks
“When you link up to another computer, you’re linking up to every computer that that computer has ever linked up to.”
Photo courtesy of stockimages www.freedigitalphotos.net