Skip to content

BRING YOUR OWN DEVICE: The good, the bad and the ugly

Best practices to help your organization reap all the benefits of BYOD, without the risks

The term ‘BYOB’ first appeared in the early 1920s. At the time, it meant ‘bring your own bottle’ and was mostly used when inviting people to parties to politely request that guests bring their own drinks along with them. A whole century later, it seems that this idea has carried over into the workplace, but in this case, it doesn’t of course refer to drinks, but rather, devices.

Today, when most of us own a plethora of digital devices, the term BYOD or ‘bring your own device’ is becoming increasingly popular. As a result, many organizations in a bid to stay current and attractive to employees (it’s an employee’s market right now), have put company policies in place that allow employees, partners, and contractors to use their personal devices for work purposes. 

However, a BYOD policy brings with it a host of advantages and disadvantages. It would be completely fair to say, that without proper risk mitigation, the potential perils of BYOD far outweigh the benefits, and what would seem initially like an innovative money-saving idea (among other things), could, in fact, cost the organization its funds, its reputation and ultimately, its clients.

IT departments wishing to support the BYOD trend need to clearly understand how to carry out BOYD policies safely and securely in order to reap its benefits, mitigate its risks, and successfully join the proverbial party.

BYOD up close and personal

So, what exactly does BOYD mean for the organization and the user? BYOD essentially means bring your own laptop, tablet, or smartphone.

Sound good for OPEX?

It is.

However, several things must be considered first. It’s a given that these devices will inevitably travel freely between the office and any other location frequented by the user.  Today, you’ll find employees working from a variety of impromptu locations. Among them, the home, the coffee shop, the beach, the airline departure lounge, the doctor’s waiting room, even, the kid’s football game.

We’ve all been there. We’ve all done it.

It’s also worth noting that the BYOD trend has evolved organically, without explicit IT authorization. Millennials and Generation Z in particular, (those born between 1981 and 1996, and 1997 onwards, respectively) expect to be able to work using any device, wherever, and whenever they want, at any hour of the day, in any number of unconventional locations.

In this article, we’ll take a close look at all the implications of BYOD, both good and bad.

Click here to get the BYOD report

About Version 2 Limited
Version 2 Limited is one of the most dynamic IT companies in Asia. The company develops and distributes IT products for Internet and IP-based networks, including communication systems, Internet software, security, network, and media products. Through an extensive network of channels, point of sales, resellers, and partnership companies, Version 2 Limited offers quality products and services which are highly acclaimed in the market. Its customers cover a wide spectrum which include Global 1000 enterprises, regional listed companies, public utilities, Government, a vast number of successful SMEs, and consumers in various Asian cities.

About Safe-T® Group Ltd.
Safe-T Group Ltd. (Nasdaq, TASE: SFET) is a provider of Zero Trust Access solutions which mitigate attacks on enterprises’ business-critical services and sensitive data, while ensuring uninterrupted business continuity. Safe-T’s cloud and on-premises solutions ensure that an organization’s access use cases, whether into the organization or from the organization out to the internet, are secured according to the “validate first, access later” philosophy of Zero Trust. This means that no one is trusted by default from inside or outside the network, and verification is required from everyone trying to gain access to resources on the network or in the cloud.

Safe-T’s wide range of access solutions reduce organizations’ attack surface and improve their ability to defend against modern cyberthreats. As an additional layer of security, our integrated business-grade global proxy solution cloud service enables smooth and efficient traffic flow, interruption-free service, unlimited concurrent connections, instant scaling and simple integration with our services.

With Safe-T’s patented reverse-access technology and proprietary routing technology, organizations of all size and type can secure their data, services and networks against internal and external threats.