The bring-your-own-device (BYOD) trend has truly taken off,
largely because business leaders know it’s increasingly something employees
want. IT departments may not always be keen on BYOD—IT managers have to closely
monitor employees’ devices to ensure the business remains protected—but they
know they have to plan for it. Moving from BYOD to choose-your-own-device
(CYOD) can be a good option for companies to minimize risks, while only
introducing a few. (If your company uses Microsoft SCCM, there is an additional
opportunity to make your IT life a little easier…I’ll explain later in this
BYOD is popular—and it
affects the workspace
This dynamic can
be difficult for companies to accommodate. Employees are now less concerned
about the technology that their companies can provide—they’re bringing and
using their own devices anyway.
According to a report by Forrester Research, as many as 53% of employees brought their own devices to work in 2012. By 2018, those numbers increased to 65%. This trend—as well as other requirements of the digital age—means that companies need to invest a significant portion of their revenue on IT and technological infrastructure. In fact, according to a Deloitte study, 57% of companies’ IT budgets are spent on business operations, including employee technology.
your BYOD policy really secure?
This may sound like an obvious
thing to ensure, but a surprisingly large number of organizations falter here. Many
of the everyday tasks performed by your employees are inherently insecure.
If your BYOD security program only covers a specific operating system (for example, Windows), many devices (including the ever-popular iPhone®) are automatically out of scope. If you have Mac® computers on premise and don’t manage them, you leave them vulnerable to Meltdown and Spectre.
I highly recommend this exceptional 10-minute read from TechGenix about how to check your BYOD policy for consistency and security by asking yourself the right questions and aligning with your IT department and company goals.
CYOD is a smart move in 2019
BYOD brings up new problems that companies have to mitigate. It’s difficult to manage employee-owned devices, so you can’t account for things like software updates, malware protection, and other protective strategies that can secure companies’ sensitive information. Employees are also more likely to use their personal devices on unsecured wireless networks, allow other people to use them, or leave company information on the device when they ultimately get rid of it.
these reasons, CYOD is a step forward from a traditional BYOD policy. With
CYOD, IT departments define a lineup of desktop and mobile devices that employees
can get from their employer. Because they are technically company-owned
devices, this mitigates the risks associated with BYOD. Employees can also get
the type of device they like. People
tend to have specific tastes and desires when it comes to their technology.
Some employees are adamantly “Apple® people,” while others will always prefer a
to implement CYOD, companies need an enterprise-level device management
solution to effectively manage the offered devices. Do you know how many Mac computers have access
to your company’s sensitive data?
If your company already uses Microsoft SCCM for managing Windows endpoints, consider Parallels® Mac Management for Microsoft® SCCM, an SCCM plug-in that allows IT admins to manage Mac devices like Windows PCs. Having Windows and Mac managed in Microsoft SCCM (in a single pane of glass) is a good strategy. It’s backed by Microsoft’s experience in Windows endpoint management and its commitment to providing tools like SCCM and Intune for enterprise-level device management.
decision you and your stakeholders make, it’s important to make note of the
points made here to ensure the viability and longevity of your solution.