One of the many areas where Jeffrey Pell assists businesses with their technical issues has to do with the influx of BYOD programs that are being used in the corporate world. BYOD, or Bring Your Own Device, is a concept with as many opponents as there are supporters. When an employee wishes to use their own electronic device instead of the one provided by the company, there are many safety and security considerations. The devices that an employee uses can range from personal laptops and tablets to smart phones.
From an employee's perspective, BYOD can be quite handy, as it allows access to the systems and programs whenever they desire. This allows the employee to conduct work from home or while traveling. Also, the employee may be more familiar with a personal device, which means that productivity is usually greater. Yet, BYOD has inherent safety flaws and many issues that can cause problems for the company and the employee.
Those who are against a BYOD program understand that by allowing employees to use their own devices, you are removing a measure of control from the business or corporation. If an employee is using a personal tablet, for example, the corporation does not have access to that device, and therefore cannot monitor it. When employees uses a personal device for business, they are inevitably storing business information on that device. If the device does not have the most up to date and sophisticated anti-virus and security features, a competent hacker can access the sensitive information on the device from anywhere. This is most often accomplished through the use of malware or through information leaks.
Often, employees who are part of a BYOD program do not even realize that they are placing their company at risk. Visiting certain websites and opening suspicious emails during their own time can lead to issues with security for the company they work for. One of the biggest issues with a BYOD program is how the company and its specific information technology department can react if there is a true breach in security. The most common solution is that all employees who participate in this system must give permission to the company and software engineer to have access to their device, and even erase all data from their device if there is an issue found.
Many employees would not want to have their entire tablet, laptop, or smartphone wiped clean because of a security breach. While it will stop the leak from going any further for the business, it also means a complete loss of personal data for the employee. Jeffrey Pell recommends thoroughly considering the pros and cons of a BYOD program before taking part in one.
From an employee's perspective, BYOD can be quite handy, as it allows access to the systems and programs whenever they desire. This allows the employee to conduct work from home or while traveling. Also, the employee may be more familiar with a personal device, which means that productivity is usually greater. Yet, BYOD has inherent safety flaws and many issues that can cause problems for the company and the employee.
Those who are against a BYOD program understand that by allowing employees to use their own devices, you are removing a measure of control from the business or corporation. If an employee is using a personal tablet, for example, the corporation does not have access to that device, and therefore cannot monitor it. When employees uses a personal device for business, they are inevitably storing business information on that device. If the device does not have the most up to date and sophisticated anti-virus and security features, a competent hacker can access the sensitive information on the device from anywhere. This is most often accomplished through the use of malware or through information leaks.
Often, employees who are part of a BYOD program do not even realize that they are placing their company at risk. Visiting certain websites and opening suspicious emails during their own time can lead to issues with security for the company they work for. One of the biggest issues with a BYOD program is how the company and its specific information technology department can react if there is a true breach in security. The most common solution is that all employees who participate in this system must give permission to the company and software engineer to have access to their device, and even erase all data from their device if there is an issue found.
Many employees would not want to have their entire tablet, laptop, or smartphone wiped clean because of a security breach. While it will stop the leak from going any further for the business, it also means a complete loss of personal data for the employee. Jeffrey Pell recommends thoroughly considering the pros and cons of a BYOD program before taking part in one.