The BYOD Debate is Not Over

tyntec-072015-2.jpg

 

Tyntec Survey

While a recent U.S.-based poll of 375 IT professionals showed the bring-your-own-device (BYOD) fad is fading, there's new evidence showing that BYOD still has plenty of life.

According to a new online poll, most workers use personal mobile phones for work tasks, often outside of work hours. Some 1,320 workers in the US, UK and Spain responded to the poll, conducted in May.

Respondents said there's widespread use of personal phones for work, including 61% of respondents in the U.S., 69% in Spain and 43% in the UK. A headline by the poll's sponsor trumpeted: "BYOD: The new norm."
The poll was conducted via Survey Monkey and commissioned by Tyntec, a German vendor of virtual, cloud-based phone numbers to help BYOD along. With the Tyntec system, IT managers can assign a work phone number and a personal number to one employee's device, so they can separate work usage from personal usage when calculating reimbursements or to keep their personal data private. (Tyntec has competitors, including Line2.)
Tyntec's poll didn't find that many workers who perform work tasks on personal devices had a formal policy for BYOD in place. A formal BYOD policy was present in only 34% of the US-based poll respondents, in 25% in Spain and 18% in the UK.

Tyntec's poll also didn't ask whether a worker's company had a "no BYOD" policy in place, which is a separate, but related, question that was explored in the recent online poll of 375 US IT professionals in private companies conducted by CompTIA.
Tyntec's poll doesn't directly contradict the CompTIA poll, since the questions weren't all the same. Still, the two polls show there are wide variations in thinking about the BYOD trend.

CompTIA, an IT trade organization, found in its April and May survey that 53% of IT respondents allowed no BYOD in their companies, up from 34% in 2013. No BYOD means the company provides smartphones and tablets to workers and bans use of personal devices for work.

In a report with the poll results, CompTIA commented that even when a company bans BYOD, "ambitious employees will find ways to utilize personal devices and applications even if they are forbidden." Tyntec's poll seems to have found that group of ambitious workers.

Meanwhile, analysts at Gartner last year predicted nearly half of all businesses would require workers to use a personal device for work by 2017. Gartner's position seems to be bolstered by the new Tyntec poll and undermined by the CompTIA poll.

Suffice it to say, it's still a matter of heated debate whether BYOD is gaining favor or not -- or is even a good business decision. Bob Egan, an analyst at Sepharim Group, said he's seen indicators for a long while that growth in BYOD is "more myth than matter." Egan said overall IT spending trends don't show that companies are shifting device costs to their workers and said one reason is that the "real and perceived business risks to go BYOD are too big." What Egan meant is that BYOD could result in employees losing corporate data on a personal device that could incur costly lawsuits and repairs.
Starting five years ago, some companies did go with BYOD in hopes of saving costs on devices and monthly network service costs. "Most companies that catapulted into BYOD in search of cost savings now feel like Wiley Coyote face-planted into a brick wall," Egan said.

One IT consultant familiar with BYOD policy deliberations within corporations said he expected to see a decline in corporate interest in BYOD until recently, when actions by US wireless carriers to eliminate subsidies have encouraged business policies that could boost BYOD.

One interprets the results of recent polls, the BYOD debate doesn't seem like it will be going away anytime soon.
Computerworld: http://bit.ly/1U3Nzyi

 

 

« Hacking Team Inside Job
Germany's New Infrastructure Cybersecurity Law »

ManageEngine
CyberSecurity Jobsite
Check Point

Directory of Suppliers

LockLizard

LockLizard

Locklizard provides PDF DRM software that protects PDF documents from unauthorized access and misuse. Share and sell documents securely - prevent document leakage, sharing and piracy.

IT Governance

IT Governance

IT Governance is a leading global provider of information security solutions. Download our free guide and find out how ISO 27001 can help protect your organisation's information.

XYPRO Technology

XYPRO Technology

XYPRO is the market leader in HPE Non-Stop Security, Risk Management and Compliance.

BackupVault

BackupVault

BackupVault is a leading provider of automatic cloud backup and critical data protection against ransomware, insider attacks and hackers for businesses and organisations worldwide.

TÜV SÜD Academy UK

TÜV SÜD Academy UK

TÜV SÜD offers expert-led cybersecurity training to help organisations safeguard their operations and data.

Ripjar

Ripjar

Ripjar is a global company of talented technologists, data scientists and analysts designing products that will change the way criminal activities are detected and prevented.

CERT.at

CERT.at

CERT.at is the Austrian national Computer Emergency Response Team.

EIT Digital

EIT Digital

EIT Digital is a leading digital innovation and entrepreneurial education organisation driving Europe’s digital transformation. Areas of focus include digital infrastructure and cyber security.

IQ Solutions

IQ Solutions

IQ Solutions is a Digital Integrator and an ICT Services Provider, focusing on innovative Cyber Secured ICT managed solutions tailored to the needs of the Maritime Industry.

Cognni

Cognni

Cognni (formerly Shieldox) will make your InfoSec think like a human, right out of the box, so you can focus on the bigger picture, keeping the information flow safe.

Cobalt Labs

Cobalt Labs

Pen Testing as a Service for Modern SaaS Businesses. Cobalt is redefining the modern pen test for companies who want serious hacker-like testing built into their development cycle.

Sigma IT

Sigma IT

SIGMA IT is one of the largest IT services organizations in EMEA region providing a full range of solutions and services including cybersecurity, data protection and business continuity.

NuCrypt

NuCrypt

NuCrypt is developing technology that is applicable to ultrahigh security data encryption as well as key distribution.

Tyler Technologies

Tyler Technologies

Tyler Technologies is a leading provider of end-to-end information management solutions and services for local governments.

SEMNet

SEMNet

SEMNet is an IT solutions provider and an infrastructure and security consulting firm.

Prevasio

Prevasio

Prevasio is a next-gen Cloud Security Posture Management (CSPM) with a built-in Vulnerability and Anti-Malware Scan for Containers.

Celebrus

Celebrus

Celebrus Fraud Data Platform, by D4t4 Solutions, works with existing fraud structures to augment functionality and turn fraud management into true fraud prevention.

HEROIC Cybersecurity

HEROIC Cybersecurity

HEROIC’s enterprise cybersecurity services help improve overall organizational security with industry best practices and advanced technology solutions.

SecureChain AI

SecureChain AI

SecureChain are combining blockchain and AI technology to create a smarter blockchain platform especially in terms of security.

Vault Cloud

Vault Cloud

Vault Cloud, Australia's National Cloud, is an Australian owned and operated company specialising in secure, sovereign, hyperscale cloud infrastructure.

Infodot Technologies

Infodot Technologies

Infodot Technologies specialize in a co-managed IT support and services approach, where businesses share their IT responsibilities with a skilled Managed IT Services Provider (MSP).