The BYOD Debate is Not Over

tyntec-072015-2.jpg

 

Tyntec Survey

While a recent U.S.-based poll of 375 IT professionals showed the bring-your-own-device (BYOD) fad is fading, there's new evidence showing that BYOD still has plenty of life.

According to a new online poll, most workers use personal mobile phones for work tasks, often outside of work hours. Some 1,320 workers in the US, UK and Spain responded to the poll, conducted in May.

Respondents said there's widespread use of personal phones for work, including 61% of respondents in the U.S., 69% in Spain and 43% in the UK. A headline by the poll's sponsor trumpeted: "BYOD: The new norm."
The poll was conducted via Survey Monkey and commissioned by Tyntec, a German vendor of virtual, cloud-based phone numbers to help BYOD along. With the Tyntec system, IT managers can assign a work phone number and a personal number to one employee's device, so they can separate work usage from personal usage when calculating reimbursements or to keep their personal data private. (Tyntec has competitors, including Line2.)
Tyntec's poll didn't find that many workers who perform work tasks on personal devices had a formal policy for BYOD in place. A formal BYOD policy was present in only 34% of the US-based poll respondents, in 25% in Spain and 18% in the UK.

Tyntec's poll also didn't ask whether a worker's company had a "no BYOD" policy in place, which is a separate, but related, question that was explored in the recent online poll of 375 US IT professionals in private companies conducted by CompTIA.
Tyntec's poll doesn't directly contradict the CompTIA poll, since the questions weren't all the same. Still, the two polls show there are wide variations in thinking about the BYOD trend.

CompTIA, an IT trade organization, found in its April and May survey that 53% of IT respondents allowed no BYOD in their companies, up from 34% in 2013. No BYOD means the company provides smartphones and tablets to workers and bans use of personal devices for work.

In a report with the poll results, CompTIA commented that even when a company bans BYOD, "ambitious employees will find ways to utilize personal devices and applications even if they are forbidden." Tyntec's poll seems to have found that group of ambitious workers.

Meanwhile, analysts at Gartner last year predicted nearly half of all businesses would require workers to use a personal device for work by 2017. Gartner's position seems to be bolstered by the new Tyntec poll and undermined by the CompTIA poll.

Suffice it to say, it's still a matter of heated debate whether BYOD is gaining favor or not -- or is even a good business decision. Bob Egan, an analyst at Sepharim Group, said he's seen indicators for a long while that growth in BYOD is "more myth than matter." Egan said overall IT spending trends don't show that companies are shifting device costs to their workers and said one reason is that the "real and perceived business risks to go BYOD are too big." What Egan meant is that BYOD could result in employees losing corporate data on a personal device that could incur costly lawsuits and repairs.
Starting five years ago, some companies did go with BYOD in hopes of saving costs on devices and monthly network service costs. "Most companies that catapulted into BYOD in search of cost savings now feel like Wiley Coyote face-planted into a brick wall," Egan said.

One IT consultant familiar with BYOD policy deliberations within corporations said he expected to see a decline in corporate interest in BYOD until recently, when actions by US wireless carriers to eliminate subsidies have encouraged business policies that could boost BYOD.

One interprets the results of recent polls, the BYOD debate doesn't seem like it will be going away anytime soon.
Computerworld: http://bit.ly/1U3Nzyi

 

 

« Hacking Team Inside Job
Germany's New Infrastructure Cybersecurity Law »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

CSI Consulting Services

CSI Consulting Services

Get Advice From The Experts: * Training * Penetration Testing * Data Governance * GDPR Compliance. Connecting you to the best in the business.

ZenGRC

ZenGRC

ZenGRC - the first, easy-to-use, enterprise-grade information security solution for compliance and risk management - offers businesses efficient control tracking, testing, and enforcement.

ManageEngine

ManageEngine

As the IT management division of Zoho Corporation, ManageEngine prioritizes flexible solutions that work for all businesses, regardless of size or budget.

IT Governance

IT Governance

IT Governance is a leading global provider of information security solutions. Download our free guide and find out how ISO 27001 can help protect your organisation's information.

North Infosec Testing (North IT)

North Infosec Testing (North IT)

North IT (North Infosec Testing) are an award-winning provider of web, software, and application penetration testing.

Resilia

Resilia

RESILIA is a comprehensive portfolio of tools and training to help your organization achieve global best practice in cyber security.

Resilience First

Resilience First

Resilience First is a not-for-profit organisation, led and funded by business to strengthen collective business resilience in all areas, including cyber security.

Cycura

Cycura

Cycura provide advanced, customized, and confidential cyber security services, cyber investigation services, and digital forensic services to governments, companies, and organizations.

Maticmind

Maticmind

Maticmind is an ICT System Integrator providing solutions and specialized skills in Networking, Security, Unified Communications & Collaboration, Datacenter & Cloud and Application.

Commonwealth Cybercrime Initiative (CCI)

Commonwealth Cybercrime Initiative (CCI)

The CCI unites 35 international organisations contributing to multidisciplinary programmes in Commonwealth countries. These organisations form the CCI Consortium.

C3.ai

C3.ai

The C3 AI Suite supports configurable, pre-built, high value AI applications for predictive maintenance, fraud detection, anti-money laundering, sensor network health and more.

Cyberhaven

Cyberhaven

Cyberhaven provides rapid enablement for GDPR and CCPA compliance, streamlined data security and modern risk management.

Citalid

Citalid

The Citalid cyber risk management platform combines threat and business intelligence to identify the risks scenarios you face.

Cyturus Technologies

Cyturus Technologies

Cyturus Technologies delivers cybersecurity business risk quantification services using our proprietary Adaptive Risk Model (ARM).

Tailscale

Tailscale

Tailscale is a VPN service that makes the devices and applications you own accessible anywhere in the world, securely and effortlessly.

Nicoll Curtin

Nicoll Curtin

Nicoll Curtin is a global company with over 20 years of experience in connecting outstanding talent with industry leading companies within Technology, Change and Cyber Security.

Detego Global

Detego Global

Detego Global are the creators of the Detego® Unified Digital Forensics Platform, a suite of modular tools used globally by military, law enforcement and intelligence agencies, and enterprises.

McKinsey & Company

McKinsey & Company

McKinsey & Company is a global management consulting firm. We are trusted advisor to the world's leading businesses, governments, and institutions.

Walacor

Walacor

Walacor’s secure data platform represents the next generation of secure data and blockchain storage with a trust-first approach that revolutionizes enterprise data, and database management systems.

Qi An Xin (QAX)

Qi An Xin (QAX)

QAX is a listed company based in China, and a leader in cybersecurity industry, providing new generation enterprise-level and national-level cybersecurity solutions.

CyberAntix

CyberAntix

CyberAntix offers Premium CyberSecurity for your business using an advanced Security Operations Centre technology and process platform reinforced by a steadfast and expert SOC team.