The BYOD Debate is Not Over

tyntec-072015-2.jpg

 

Tyntec Survey

While a recent U.S.-based poll of 375 IT professionals showed the bring-your-own-device (BYOD) fad is fading, there's new evidence showing that BYOD still has plenty of life.

According to a new online poll, most workers use personal mobile phones for work tasks, often outside of work hours. Some 1,320 workers in the US, UK and Spain responded to the poll, conducted in May.

Respondents said there's widespread use of personal phones for work, including 61% of respondents in the U.S., 69% in Spain and 43% in the UK. A headline by the poll's sponsor trumpeted: "BYOD: The new norm."
The poll was conducted via Survey Monkey and commissioned by Tyntec, a German vendor of virtual, cloud-based phone numbers to help BYOD along. With the Tyntec system, IT managers can assign a work phone number and a personal number to one employee's device, so they can separate work usage from personal usage when calculating reimbursements or to keep their personal data private. (Tyntec has competitors, including Line2.)
Tyntec's poll didn't find that many workers who perform work tasks on personal devices had a formal policy for BYOD in place. A formal BYOD policy was present in only 34% of the US-based poll respondents, in 25% in Spain and 18% in the UK.

Tyntec's poll also didn't ask whether a worker's company had a "no BYOD" policy in place, which is a separate, but related, question that was explored in the recent online poll of 375 US IT professionals in private companies conducted by CompTIA.
Tyntec's poll doesn't directly contradict the CompTIA poll, since the questions weren't all the same. Still, the two polls show there are wide variations in thinking about the BYOD trend.

CompTIA, an IT trade organization, found in its April and May survey that 53% of IT respondents allowed no BYOD in their companies, up from 34% in 2013. No BYOD means the company provides smartphones and tablets to workers and bans use of personal devices for work.

In a report with the poll results, CompTIA commented that even when a company bans BYOD, "ambitious employees will find ways to utilize personal devices and applications even if they are forbidden." Tyntec's poll seems to have found that group of ambitious workers.

Meanwhile, analysts at Gartner last year predicted nearly half of all businesses would require workers to use a personal device for work by 2017. Gartner's position seems to be bolstered by the new Tyntec poll and undermined by the CompTIA poll.

Suffice it to say, it's still a matter of heated debate whether BYOD is gaining favor or not -- or is even a good business decision. Bob Egan, an analyst at Sepharim Group, said he's seen indicators for a long while that growth in BYOD is "more myth than matter." Egan said overall IT spending trends don't show that companies are shifting device costs to their workers and said one reason is that the "real and perceived business risks to go BYOD are too big." What Egan meant is that BYOD could result in employees losing corporate data on a personal device that could incur costly lawsuits and repairs.
Starting five years ago, some companies did go with BYOD in hopes of saving costs on devices and monthly network service costs. "Most companies that catapulted into BYOD in search of cost savings now feel like Wiley Coyote face-planted into a brick wall," Egan said.

One IT consultant familiar with BYOD policy deliberations within corporations said he expected to see a decline in corporate interest in BYOD until recently, when actions by US wireless carriers to eliminate subsidies have encouraged business policies that could boost BYOD.

One interprets the results of recent polls, the BYOD debate doesn't seem like it will be going away anytime soon.
Computerworld: http://bit.ly/1U3Nzyi

 

 

« Hacking Team Inside Job
Germany's New Infrastructure Cybersecurity Law »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Clayden Law

Clayden Law

Clayden Law advise global businesses that buy and sell technology products and services. We are experts in information technology, data privacy and cybersecurity law.

LockLizard

LockLizard

Locklizard provides PDF DRM software that protects PDF documents from unauthorized access and misuse. Share and sell documents securely - prevent document leakage, sharing and piracy.

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

North Infosec Testing (North IT)

North Infosec Testing (North IT)

North IT (North Infosec Testing) are an award-winning provider of web, software, and application penetration testing.

Syxsense

Syxsense

Syxsense brings together endpoint management and security for greater efficiency and collaboration between IT management and security teams.

Rollbar

Rollbar

Rollbar is a full-stack error monitoring platform for web and mobile applications. We help developers find and fix bugs fast. Built by developers for developers.

Micro Focus

Micro Focus

Micro Focus is one of the world’s largest enterprise software providers. We deliver trusted and proven mission-critical software that keeps the digital world running.

Cyber Security Recruiters

Cyber Security Recruiters

Cyber Security Recruiters is a niche recruiting firm who finds impact players for our clients in the Information Security Space.

National Association of State Chief Information Officers (NASCIO)

National Association of State Chief Information Officers (NASCIO)

NASCIO's Cybersecurity Committee focuses helps state CIOs to formulate high-level security and data protection policies and technical controls.

AuthenTrend

AuthenTrend

AuthenTrend provide biometric authentication products to achieve high security with extreme ease-of-use for the user.

IDpendant

IDpendant

IDpendant offers a wide range of services, including authentication technology, client security products, single sign on systems, encryption solutions, card and mobile device management systems.

Think Cyber Security (ThinkCyber)

Think Cyber Security (ThinkCyber)

ThinkCyber is a Tel Aviv-based Israeli company with a team of cybersecurity professionals who are experts in both information and operations technology.

Proteus

Proteus

Proteus is an Information Security consulting firm specialized in Risk Analysis and Executive Control.

Alias Robotics

Alias Robotics

Alias Robotics is a robot cyber security company. We deliver cyber security solutions for robots and robot components.

Rubrik

Rubrik

Rubrik helps enterprises achieve data control to drive business resiliency, cloud mobility, and regulatory compliance.

Condition Zebra

Condition Zebra

Condition Zebra has wide experience in providing IT Security Services, Training, and Certification in the field of cybersecurity.

Riskonnect

Riskonnect

Riskonnect technology empowers organizations with the ability to anticipate, manage, and respond in real-time to strategic, operational, and digital risks across the extended enterprise.

Opus Security

Opus Security

Opus dramatically reduces cloud security risks by enabling teams to define, orchestrate, automate and measure remediation processes across the entire distributed organization.

Resourcive

Resourcive

Resourcive is the first Value Added Sourcing “VAS” consultancy. We deliver strategic IT sourcing solutions to mid-market and enterprise clients.

CloudScale365

CloudScale365

CloudScale365 offers state-of-the-art managed IT services and cloud, hosting, security, and business continuity solutions.

Project Cypher

Project Cypher

Project Cypher leverages the latest cybersecurity developments, a world class team of hackers and constant R&D to provide you with unparalleled cybersecurity offerings.