The new orthodoxy: Bring your own device

Even the most cynical of us are susceptible to advertising and foolhardy followers of certain brands. We’d like to think we’re immune to this, that we’re individualistic, capricious and that we choose our own paths. No sir, not the case.

Take for example baked beans. Now we’re not one to product place, but Heinz Beanz is a really rather tasty variety of beans. Some of us swear by it, even if we’ve never tasted the alternatives. I guess it’s just human nature; we have an experience and that becomes the defacto expectation.

In much the same way, brand identity has permeated itself in the technology we use in a personal capacity. Traditionalists might swear by Dell (and Microsoft) while creative types option for the coolness of Apple (and Mac OS X) instead. Generalisations, yes, but the fidelity towards a name, product or company is true. We like what we like.

In an age typified by daily change, the biggest shake up in human activity has been the division between work and leisure time. The boundary has been blurred, bringing with it a shaky balance of both positives and negatives. A downside is working longer hours and eroding any sense of pure relaxation.  A positive is that of flexible working that allows us to spend more time at home, looking after children or carrying our errands that otherwise would have been impossible.

Lately, the concept of ‘bring your own device’ (BYOD) has begun to take on a life of its own as companies scrap previously longstanding ways of operating.  BYOD is, self explanatory: employees bring their own devices into the workplace and/or operate from them remotely. It is characterised by movement, and typically the devices are portable (laptops, netbooks, tablets and smartphones).

It’s a win-win for both employer and employee. Employee’s get to work from devices which they both like and are most efficient on – brand loyalty at its best. While the employer saves money on purchasing the technology, troubleshooting, repairs and having to update machinery and software on a fairly regular basis.

As great as it is – and we are supportive of this flexible style of working – there are inherent problems attached with BYOD. Principally, as those involved in our industry will attest to, the security issues are plenty. With a plethora of devices native to any given organisation, the ability to provide appropriate data protection and security in a uniformed way becomes a challenge.

Every device and operating system is not only distinct in itself, but they also come with their own divergent vulnerabilities and malware. This leads to a complex array of networks which are difficult to monitor and keep protected.

We’re just beginning to realise the problem with many businesses only now catching up to the problems that can arise – i.e. protecting the company’s network and data when employees need access from their privately owned devices.

Not to mention the issues that employees may have around designating their device memory to work, sacrificing monthly data allowance and  battery life.  Device tracking is also an issue because the the device can be location tracked by the company at any time.

One expert, Graeme Batsman, director of Datadefender.co.uk, has put forward an idea of an automated approach (this allows for port and device control, while being capable of remotely locking or deleting data). It’s a good idea, and a suitable start, but as BYOD becomes more commonplace, more solutions will need to arise. After all, the more we get used to enjoying working on our preferred technological machinery, the better our work productivity will become – businesses don’t want to lose out on that.

Our accreditations & Partners

  • REC Member
  • VTC - Virtual Technology Cluster
  • Bloom Nepro
  • YPO
  • Crown Commerical Service
  • Disability Confident
  • ISO 9001
  • Armed Force Covenant
  • Cyber Essentials Plus
  • ISO 27001

Thanks

Success

Thanks

Success

Thank you for signing up to the acumin alerts.

Send CV

Send us your CV and have our recruiters match you to the ideal opportunities

Do you already have an account with us?

Log in

Want to have an account with us?

Register

Want to just send us your CV?

Upload only doc, docx, odt, pdf format file.

By submitting your registration and CV to us you are agreeing to join our database and to be contacted about relevant jobs industry communications. Please read our terms of business for more information.

Password reset

If you need a reminder for your password, fill out the field below

Log in

Access your account to edit your contact details, job alerts or to upload a new CV

Thank you

Success

Thank you for successfully uploading your CV.

Acumin Alerts

Success

Thanks for registering for Acumin alerts.

Acumin Alerts

Unfortunately your CV could not be uploaded

Please make sure your CV is one of the following file types: doc, docx, odt, pdf, rtf

Acumin Spam

Unfortunately your submission has been declared spam. Please try again.

Vacancy

Success

Thank you for submitting your vacancy.

Register

Create an account to register your contact details, sign up for job alerts and upload your CV

Success

Thanks for registering for Acumin alerts. To get the most out of Acumin's service why not register with us?

Upload only doc, docx, odt, pdf format file.
- Practitioner
- Commercial

I agree to the terms and conditions and to be contacted by recruiters:

I agree to receive marketing communications relevant to my job search:

I agree to receive Jobs By Email for the following professions:
- Business Continuity Management
- Counter Fraud
- Cyber Security
- Executive Management
- Governance & Compliance
- Information Security & Risk Management
- Penetration Testing & Digital Forensics
- Sales and Marketing
- Sales Engineering
- Security Management
- Technical Security
- Information/Risk Assurance
- Identity Management
- Application Security
- Security Architecture
- Dev/Sec Ops
- DV & SC Cleared Jobs
- Programme & Project Management
- CISO/CSO

Submit a Vacancy

Use the form below to submit a vacancy