The BYOD Debate is Not Over

tyntec-072015-2.jpg

 

Tyntec Survey

While a recent U.S.-based poll of 375 IT professionals showed the bring-your-own-device (BYOD) fad is fading, there's new evidence showing that BYOD still has plenty of life.

According to a new online poll, most workers use personal mobile phones for work tasks, often outside of work hours. Some 1,320 workers in the US, UK and Spain responded to the poll, conducted in May.

Respondents said there's widespread use of personal phones for work, including 61% of respondents in the U.S., 69% in Spain and 43% in the UK. A headline by the poll's sponsor trumpeted: "BYOD: The new norm."
The poll was conducted via Survey Monkey and commissioned by Tyntec, a German vendor of virtual, cloud-based phone numbers to help BYOD along. With the Tyntec system, IT managers can assign a work phone number and a personal number to one employee's device, so they can separate work usage from personal usage when calculating reimbursements or to keep their personal data private. (Tyntec has competitors, including Line2.)
Tyntec's poll didn't find that many workers who perform work tasks on personal devices had a formal policy for BYOD in place. A formal BYOD policy was present in only 34% of the US-based poll respondents, in 25% in Spain and 18% in the UK.

Tyntec's poll also didn't ask whether a worker's company had a "no BYOD" policy in place, which is a separate, but related, question that was explored in the recent online poll of 375 US IT professionals in private companies conducted by CompTIA.
Tyntec's poll doesn't directly contradict the CompTIA poll, since the questions weren't all the same. Still, the two polls show there are wide variations in thinking about the BYOD trend.

CompTIA, an IT trade organization, found in its April and May survey that 53% of IT respondents allowed no BYOD in their companies, up from 34% in 2013. No BYOD means the company provides smartphones and tablets to workers and bans use of personal devices for work.

In a report with the poll results, CompTIA commented that even when a company bans BYOD, "ambitious employees will find ways to utilize personal devices and applications even if they are forbidden." Tyntec's poll seems to have found that group of ambitious workers.

Meanwhile, analysts at Gartner last year predicted nearly half of all businesses would require workers to use a personal device for work by 2017. Gartner's position seems to be bolstered by the new Tyntec poll and undermined by the CompTIA poll.

Suffice it to say, it's still a matter of heated debate whether BYOD is gaining favor or not -- or is even a good business decision. Bob Egan, an analyst at Sepharim Group, said he's seen indicators for a long while that growth in BYOD is "more myth than matter." Egan said overall IT spending trends don't show that companies are shifting device costs to their workers and said one reason is that the "real and perceived business risks to go BYOD are too big." What Egan meant is that BYOD could result in employees losing corporate data on a personal device that could incur costly lawsuits and repairs.
Starting five years ago, some companies did go with BYOD in hopes of saving costs on devices and monthly network service costs. "Most companies that catapulted into BYOD in search of cost savings now feel like Wiley Coyote face-planted into a brick wall," Egan said.

One IT consultant familiar with BYOD policy deliberations within corporations said he expected to see a decline in corporate interest in BYOD until recently, when actions by US wireless carriers to eliminate subsidies have encouraged business policies that could boost BYOD.

One interprets the results of recent polls, the BYOD debate doesn't seem like it will be going away anytime soon.
Computerworld: http://bit.ly/1U3Nzyi

 

 

« Hacking Team Inside Job
Germany's New Infrastructure Cybersecurity Law »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Jooble

Jooble

Jooble is a job search aggregator operating in 71 countries worldwide. We simplify the job search process by displaying active job ads from major job boards and career sites across the internet.

Resecurity, Inc.

Resecurity, Inc.

Resecurity is a cybersecurity company that delivers a unified platform for endpoint protection, risk management, and cyber threat intelligence.

LockLizard

LockLizard

Locklizard provides PDF DRM software that protects PDF documents from unauthorized access and misuse. Share and sell documents securely - prevent document leakage, sharing and piracy.

CSI Consulting Services

CSI Consulting Services

Get Advice From The Experts: * Training * Penetration Testing * Data Governance * GDPR Compliance. Connecting you to the best in the business.

XYPRO Technology

XYPRO Technology

XYPRO is the market leader in HPE Non-Stop Security, Risk Management and Compliance.

British Assessment Bureau

British Assessment Bureau

The British Assessment Bureau is an ISO certification body. We check conformity and compliance of companies to recognised ISO standards including ISO 27001.

Sintef Digital

Sintef Digital

Sintef Digital carries out research in Information and Communication Technology for industry and the public sector.

Achtwerk

Achtwerk

Achtwerk manufacture the security appliance IRMA for critical infrastructures and networked automation in production plants.

Lumen Technologies

Lumen Technologies

Lumen is an enterprise technology platform that enables companies to capitalize on emerging applications and power the 4th Industrial Revolution (4IR).

GOVCERT.lu

GOVCERT.lu

GOVCERT.lu is responsible for the treatment of all computer related incidents jeopardising the information systems of the government and defined critical infrastructure operators in Luxembourg.

CERT-PH

CERT-PH

CERT-PH is the National Computer Emergency Response Team and the highest body for cybersecurity related activities in the Philippines.

Exeon Analytics

Exeon Analytics

Exeon Analytics is a Swiss cyber security company that is specialized in detecting hidden data breaches and advanced cyber attacks.

Griffeshield

Griffeshield

Griffeshield is a company specialised in new information technologies used to protect Intellectual Property.

AppOmni

AppOmni

AppOmni is the only SaaS CSPM solution that gives teams all the tools they need to be successful – from security posture management to monitoring and detection to continuous compliance.

Mission Critical Partners (MCP)

Mission Critical Partners (MCP)

Mission Critical Partners is committed to delivering innovative solutions that help our clients enhance and evolve their critical-communications systems and operations.

Slamm Technologies

Slamm Technologies

Slamm Technologies is a trusted IT firm that offers Cyber Security Support, Corporate IT Solutions and Professional IT Training courses with international certification.

Oort

Oort

Oort is an identity threat detection and response platform for enterprise security. The Oort platform is API-driven, cloud-native and agentless for rapid time to value and high scalability.

Beyon Cyber

Beyon Cyber

Beyon Cyber offer a complete portfolio of advanced solutions & services for cyber security in Bahrain.

Keyrus

Keyrus

Keyrus is a global consultancy that develops data and digital solutions for performance management.

Center for Cyber Security Studies & Research (CFCS2R)

Center for Cyber Security Studies & Research (CFCS2R)

CFCS2R's mission is to empower individuals, organizations, and governments with the knowledge and tools necessary to protect against cyber threats.

Orca Fraud

Orca Fraud

Orca is an AI-driven fraud orchestration platform. We empower fraud fighters to outpace fraud using our custom ML models.