i-medIT Blog

What You Need to Consider About BYOD

What You Need to Consider About BYOD

One of the biggest buzzwords in business these days is BYOD - Bring Your Own Device - and for good reason. There are plenty of operational benefits that an organization can enjoy by adopting a BYOD policy; but, BYOD isn’t an inherently perfect solution, which means that businesses that leverage it need to do so mindfully.

To begin, let’s briefly review the basic principles of BYOD practices. In essence, rather than providing each employee with a company-supplied device, an employee is allowed to bring in a device that they own and leverage it for work purposes.

Why BYOD Has Become Popular in Workplaces

On the surface, BYOD seems to be the perfect solution - there are even statistics that help to support this position. For instance, companies who embrace BYOD practices save around $350 each year, per employee. Furthermore, using portable devices for work (much like what would be used as part of a Bring Your Own Device practice) has been shown to save employees approximately an hour each day, increasing their productivity by about a third.

This is just the tip of the BYOD-benefits iceberg. There are much more, including:

Access to Better Technology

If you were to list any business’ technology priorities, security and productivity should top the list… but oftentimes, frugality wins the day. Budgetary restrictions and a preference for tried-and-tested solutions frequently means that investments into more recent solutions are often pushed by the wayside. After all, what if the expensive new technology doesn’t work properly? This is frequently why businesses find themselves making due with solutions that really should be replaced. On the other hand, employees likely have no such qualms when they purchase their own devices.

BYOD policies allow a business’ employees to replace their outdated solutions with the reliability of newer, more up-to-date devices… leading to happier, more productive employees.

Reduced Financial Toll on the Business

Like we mentioned, it is fairly common for budgetary concerns to be the driving factor of many business decisions. It isn’t that the company doesn’t want to replace the aging workstations scattered around the office… it just isn’t in the budget. Before Bring Your Own Device emerged, businesses were stuck in a few different money pits. Between providing their employees with devices, maintaining and replacing these devices when they went faulty, and all the other expenses that come from keeping up an IT infrastructure, employers were stuck with a hefty bill.

Nowadays, with many people investing in their own devices and their accessibility, these expenses can largely evaporate. The employer’s investment can be effectively limited to securing access to these devices, allowing funds to be spent on other meaningful initiatives.

Employee Satisfaction

We’ve all experienced the struggle of trying to do work on equipment that just isn’t equipped for what we are trying to do. It can feel like trying to play Yahtzee with loaded dice - it just isn’t going to work, no matter how much effort is put forth. This is the other side of the example that preceded this one. If the aging workstations scattered around the office aren’t replaced due to budgetary concerns, some employees are going to be stuck using them… and they aren’t going to be happy.

As we alluded to as we described the effects that access to improved solutions can bring, an employee who isn’t being hamstrung by their technology is simply going to be more productive and happier with their working situation.

Clearly, BYOD isn’t something that should be dismissed without at least some consideration, but that isn’t to say that it is a perfect solution. There are also potential issues that need to be addressed as a BYOD policy is considered.

The Potential Issues of BYOD


For every productivity application available on the Google Play Store, there is at least one application that is decidedly unproductive… at least, in terms of your business and its operations. While you could take steps to prevent these kinds of applications from appearing on devices that you provide, there isn’t much you can do about your employees downloading whatever they want onto their own.

Loss of Control

This is a big issue for businesses, as there are a multitude of ways that their losing control over the devices on their network could impact them. The policies that once prevented vulnerabilities from being leveraged can’t just be installed on an employee’s device without their consent, which many employees may be hesitant to give. This problem becomes even larger if an employee is fired or quits - what happens to the data on their device? How can a company be sure that a current employee isn’t putting sensitive company data at risk? What if the device is lost?

Compliance Shortcomings

Finally, you have to consider how your BYOD implementation will interact with any other compliances or requirements that your business is beholden to. In the past, a shockingly low number of IT leaders and professionals were confident that their BYOD policies met the standards placed by a variety of requirements, including HIPAA and Dodd-Frank.

How Can I Leverage BYOD Securely?

Fortunately, there are a few means of adopting a BYOD approach within your business while mitigating the concerns described above. The simplest way is to simply enforce a use policy, outlining the guidelines that your employees must follow if they wish to use their personal devices for work purposes.

i-medIT can help you to create and enforce these guidelines, as well as optimize your use of your IT in many other ways. To learn more, reach out to our team by calling 630-549-6199.

What Does Internet Rights Advocacy Mean?
Determining Your Organization’s Cloud Needs


No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Tuesday, June 25 2019

Captcha Image

Mobile? Grab this Article!

QR-Code dieser Seite

Tag Cloud

Tip of the Week Security Technology Best Practices Business Computing Privacy Cloud Google Hackers Innovation User Tips Internet Productivity Hosted Solutions Microsoft Email Data Network Security Hardware Mobile Devices Tech Term Efficiency Business Backup Malware Smartphones Small Business Workplace Tips Data Backup Communications VoIP Smartphone Cloud Computing Android Network Data Recovery IT Support Communication Windows 10 Managed IT Services Software Gadgets Business Management Browser Server Internet of Things Windows Cybercrime IT Services Chrome Cybersecurity Computer Artificial Intelligence Router Business Continuity Ransomware Miscellaneous Mobile Device Information How To Outsourced IT Upgrade Phishing Collaboration Spam Automation Computers Social Media Users Office 365 Saving Money BDR Word Disaster Recovery Money Save Money Applications Productivity Mobile Device Management Law Enforcement Social Engineering Operating System Quick Tips Holiday Bandwidth Alert Data Protection Managed Service Paperless Office App Telephone Systems Managed IT Services Data Breach Connectivity BYOD Voice over Internet Protocol Encryption Passwords Remote Monitoring Safety Private Cloud Vulnerability Bring Your Own Device Government Data Security Sports Google Drive Two-factor Authentication Settings Wi-Fi Facebook Staff Apps Redundancy Google Docs Content Management Avoiding Downtime Spam Blocking Comparison Website Blockchain Internet Exlporer Virtual Assistant Display Data storage Education Machine Learning Data Storage Physical Security Networking Meetings Password Telephone System Identity Theft Cleaning Access Control Managed IT Software as a Service IT Management Business Intelligence Downtime Scam Telephony Human Resources Gmail Windows 7 YouTube OneNote Update Health Windows 10 Augmented Reality Public Cloud Botnet Infrastructure IT Plan Keyboard Training Recovery Fraud Virtualization The Internet of Things Microsoft Office CES Cryptocurrency VPN Servers Unsupported Software Practices End of Support 5G Start Menu Cortana Chromecast Document Management Search Engine Budget Screen Mirroring Trending ISP Amazon Addiction Warranty Customer Root Cause Analysis Safe Mode Files Telecommuting Smart Tech Wiring Monitor PDF Computer Fan IT Infrastructure Virtual Reality Save Time Business Mangement Uninterrupted Power Supply Going Green HVAC Vendor Touchpad iPhone Software Tips Employee Excel Hosted Computing Charger Internet exploMicrosoft OLED Firewall Tools Google Apps Bing Office Cast Flexibility Cryptomining Sync Amazon Web Services Data Management NarrowBand Cache Printer Hacking Marketing Digital Signature Black Market History Netflix Tip of the week Remote Work Unified Threat Management FENG Investment Hiring/Firing Recycling Office Tips Enterprise Content Management Managed Service Provider webinar Digital Signage Inventory MSP Computer Care Advertising Windows 10s Manufacturing Employer-Employee Relationship DDoS Help Desk Relocation Current Events Mobility Specifications Database Patch Management Online Shopping Wireless Technology Wireless Internet Mouse HIPAA USB Windows Server 2008 Devices Mobile Computing ROI Automobile eWaste Password Management Conferencing Google Search File Sharing Outlook Samsung Cabling Workers Knowledge Security Cameras Legal User Error Business Technology Evernote Wire Administrator IBM Accountants Proactive IT Credit Cards Thought Leadership Camera Work/Life Balance Criminal Tech Support NIST Emails Authentication Humor Value Solid State Drive Cables Shortcuts Network Congestion Hacker HBO Millennials Robot Biometric Security Skype Wireless Charging Smart Office Microchip Supercomputer Data loss HaaS Entertainment Multi-Factor Security Net Neutrality Big Data Flash Reputation Wireless WiFi Shadow IT Nanotechnology Remote Worker Hybrid Cloud Audit Default App Electronic Medical Records Travel Password Manager Social Laptop Apple IT Consultant Smartwatch Frequently Asked Questions Workforce Vendor Management Benefits IT Support Books Bluetooth IT solutions Remote Computing SaaS Video Games Music Battery Emergency Wearable Technology Information Technology Worker Commute Scalability Smart Technology Risk Management Search Content Thank You Worker Assessment Employer Employee Relationship Computing Infrastructure Two Factor Authentication Company Culture Politics Rootkit How to Techology Audiobook Congratulations Compliance Instant Messaging Troubleshooting Television GDPR Computer Accessories Managing Stress Best Practice Regulation Transportation Twitter Printers Public Computer CrashOverride Webinar Loyalty Experience