The BYOD Debate is Not Over

tyntec-072015-2.jpg

 

Tyntec Survey

While a recent U.S.-based poll of 375 IT professionals showed the bring-your-own-device (BYOD) fad is fading, there's new evidence showing that BYOD still has plenty of life.

According to a new online poll, most workers use personal mobile phones for work tasks, often outside of work hours. Some 1,320 workers in the US, UK and Spain responded to the poll, conducted in May.

Respondents said there's widespread use of personal phones for work, including 61% of respondents in the U.S., 69% in Spain and 43% in the UK. A headline by the poll's sponsor trumpeted: "BYOD: The new norm."
The poll was conducted via Survey Monkey and commissioned by Tyntec, a German vendor of virtual, cloud-based phone numbers to help BYOD along. With the Tyntec system, IT managers can assign a work phone number and a personal number to one employee's device, so they can separate work usage from personal usage when calculating reimbursements or to keep their personal data private. (Tyntec has competitors, including Line2.)
Tyntec's poll didn't find that many workers who perform work tasks on personal devices had a formal policy for BYOD in place. A formal BYOD policy was present in only 34% of the US-based poll respondents, in 25% in Spain and 18% in the UK.

Tyntec's poll also didn't ask whether a worker's company had a "no BYOD" policy in place, which is a separate, but related, question that was explored in the recent online poll of 375 US IT professionals in private companies conducted by CompTIA.
Tyntec's poll doesn't directly contradict the CompTIA poll, since the questions weren't all the same. Still, the two polls show there are wide variations in thinking about the BYOD trend.

CompTIA, an IT trade organization, found in its April and May survey that 53% of IT respondents allowed no BYOD in their companies, up from 34% in 2013. No BYOD means the company provides smartphones and tablets to workers and bans use of personal devices for work.

In a report with the poll results, CompTIA commented that even when a company bans BYOD, "ambitious employees will find ways to utilize personal devices and applications even if they are forbidden." Tyntec's poll seems to have found that group of ambitious workers.

Meanwhile, analysts at Gartner last year predicted nearly half of all businesses would require workers to use a personal device for work by 2017. Gartner's position seems to be bolstered by the new Tyntec poll and undermined by the CompTIA poll.

Suffice it to say, it's still a matter of heated debate whether BYOD is gaining favor or not -- or is even a good business decision. Bob Egan, an analyst at Sepharim Group, said he's seen indicators for a long while that growth in BYOD is "more myth than matter." Egan said overall IT spending trends don't show that companies are shifting device costs to their workers and said one reason is that the "real and perceived business risks to go BYOD are too big." What Egan meant is that BYOD could result in employees losing corporate data on a personal device that could incur costly lawsuits and repairs.
Starting five years ago, some companies did go with BYOD in hopes of saving costs on devices and monthly network service costs. "Most companies that catapulted into BYOD in search of cost savings now feel like Wiley Coyote face-planted into a brick wall," Egan said.

One IT consultant familiar with BYOD policy deliberations within corporations said he expected to see a decline in corporate interest in BYOD until recently, when actions by US wireless carriers to eliminate subsidies have encouraged business policies that could boost BYOD.

One interprets the results of recent polls, the BYOD debate doesn't seem like it will be going away anytime soon.
Computerworld: http://bit.ly/1U3Nzyi

 

 

« Hacking Team Inside Job
Germany's New Infrastructure Cybersecurity Law »

CyberSecurity Jobsite
Check Point

Directory of Suppliers

Syxsense

Syxsense

Syxsense brings together endpoint management and security for greater efficiency and collaboration between IT management and security teams.

MIRACL

MIRACL

MIRACL provides the world’s only single step Multi-Factor Authentication (MFA) which can replace passwords on 100% of mobiles, desktops or even Smart TVs.

Alvacomm

Alvacomm

Alvacomm offers holistic VIP cybersecurity services, providing comprehensive protection against cyber threats. Our solutions include risk assessment, threat detection, incident response.

XYPRO Technology

XYPRO Technology

XYPRO is the market leader in HPE Non-Stop Security, Risk Management and Compliance.

IT Governance

IT Governance

IT Governance is a leading global provider of information security solutions. Download our free guide and find out how ISO 27001 can help protect your organisation's information.

Cybsecurity Foundation (CSF)

Cybsecurity Foundation (CSF)

Cybsecurity is a non-profit NGO, which aims to work on improvement of security levels in the Polish cyberspace.

International Organization for Standardization (ISO)

International Organization for Standardization (ISO)

ISO is an independent, non-governmental international standards organization. The ISO/IEC 27001 is the standard for information security management systems.

Cyber8Lab

Cyber8Lab

Cyber8Lab provides cybersecurity training programmes simulating real world cybersecurity incidents such as web defacement, malware, phishing, digital forensics analysis and wireless intrusion.

Malware Patrol

Malware Patrol

Malware Patrol provides intelligent threat data that protects against cyber attacks.

Finnish Accreditation Service (FINAS)

Finnish Accreditation Service (FINAS)

FINAS is the national accreditation body for Finland. The directory of members provides details of organisations offering certification services for ISO 27001.

Cybil

Cybil

Cybil is a publicly-available portal where members of the international cyber capacity building community can find and share information to support the design and delivery of programs and projects.

SDG Corp

SDG Corp

SDG is a global cybersecurity, identity governance, risk consulting and advisory firm, addressing complex security, compliance and technology needs.

InfoSec Conferences

InfoSec Conferences

InfoSec Conferences is an online directory of infosec conferences. We list every single Information Security conference, event and seminar within every niche in Cybersecurity.

Alias Robotics

Alias Robotics

Alias Robotics is a robot cyber security company. We deliver cyber security solutions for robots and robot components.

CyberLab

CyberLab

CyberLab (formerly Chess) is a specialist cyber security company that provides a wide range of security solutions and services.

Detego Global

Detego Global

Detego Global are the creators of the Detego® Unified Digital Forensics Platform, a suite of modular tools used globally by military, law enforcement and intelligence agencies, and enterprises.

Balance Theory

Balance Theory

Balance Theory provides the knowledge infrastructure and collaboration center for the cybersecurity community. A networked community to build better cybersecurity outcomes.

CYMAR

CYMAR

CYMAR The “CYBER” Smart Solution to offer sustainability and bring resilience to Global SMART Terminals and protect the supply chain of the World’s economy.

TriCIS

TriCIS

TriCIS design and engineer highly secure integrated solutions that meet the highest government and military security standards, providing information assurance to organisations across the globe.

WaveLink

WaveLink

WaveLink offers low risk, results-oriented Engineering Services and best-of-class Technical Support Services. Areas of expertise include cyber and security engineering.

InterSources

InterSources

InterSources is a trusted partner, leading the way in Cloud Security, Cybersecurity, PLG Consulting, Digital Transformation, and Professional Services.