BYOD has proven challenging for many organizations, with up to 20% of current BYOD programs set to fail within 2 years. BYOD programs often fail because security standards are set too strictly, so employees are not following them. While at face value BYOD seems to offer employees freedom and choice, its implementation has often been either unmonitored or over-monitored. It’s a difficult balance for IT, and one made more difficult by the variety of devices and operating systems presented under a purely BYOD scenario.
Given the challenges of BYOD, there has been a shift toward other device management scenarios. According to a study by CompTIA, 53% of companies are not using BYOD, a number which was at 34% just two years ago. Instead, there has been a shift toward corporate-owned-personally-enabled (CoPE) or choose-your-own-device (CYOD) scenarios, or a hybrid approach of BYOD and CYOD. These device management scenarios allow employees to choose between pre-approved devices, giving greater enterprise control over endpoint management and security.
“There is a clear move towards a policy of no BYOD,” the report stated. The report continues that employees “are often happy to take a corporate device if it is the same thing they would choose on their own.”
The report found that employees are very often using corporate devices for personal use, similar to the results of our own study. This report looked at employee willingness to use a single device, and not the security implications inherent in personal use of corporate devices.
In our whitepaper The Enemy Within – Insiders are still the weakest link in your data security chain, we discuss the importance of education, policy and technology in ensuring that this dual use of corporate devices does not put corporate data at risk. Absolute DDS can help your organization plug the security holes created by mobility and human error. Our unique Persistence technology offers an important layer to any data security strategy and helps mitigate the risk of human error, rogue employees, and cybercrime. Learn more at Absolute.com