{"id":2782,"date":"2016-06-14T16:49:15","date_gmt":"2016-06-14T16:49:15","guid":{"rendered":"https:\/\/devbloglavaprotocols.nityo.in\/the-culture-of-byod\/"},"modified":"2016-06-14T16:49:15","modified_gmt":"2016-06-14T16:49:15","slug":"the-culture-of-byod","status":"publish","type":"post","link":"https:\/\/www.lavaprotocols.com\/the-cloud-blog\/the-culture-of-byod\/","title":{"rendered":"The Culture of BYOD"},"content":{"rendered":"<div style=\"margin-top: 0px; margin-bottom: 0px;\" class=\"sharethis-inline-share-buttons\" ><\/div><p><span style=\"font-weight: 400;\"> Is the practice of bringing your own device to work a perk or a setback?<\/span><span style=\"font-weight: 400;\"><br \/> <\/span><\/p>\n<p><!--more--><\/p>\n<p><span style=\"font-weight: 400;\">We\u2019re creatures of comfort and habit \u2013 so it was only a matter of time until we decided to bring our favourite mobile device from home to work. Besides who wants to be the proverbial bad workman when we can use a tool that we\u2019re familiar with? As a result, the culture of \u201cBring Your Own Device\u201d (BYOD) was born. <\/span><\/p>\n<p><span style=\"font-weight: 400;\">Roughly translated, employees are allowed to bring their personal devices (tablets, smartphones, laptops) to work and use them as an office equipment. The ease of <a href=\"https:\/\/lavaprotocols.com\/2018\/06\/07\/cloud-identity-allowing-you-to-manage-users-devices-and-apps-in-one-location\/\" target=\"_blank\" rel=\"noopener\">working from anywhere, anytime<\/a> using your mobile device is definitely convenient and to a large extent increases efficiency amongst employees.\u00a0<\/span><\/p>\n<div id=\"attachment_4808\" style=\"width: 567px\" class=\"wp-caption aligncenter\">\n <a href=\"https:\/\/static.hsstatic.net\/BlogImporterAssetsUI\/ex\/missing-image.png\"><img aria-describedby=\"caption-attachment-4808\" data-attachment-id=\"4808\" data-permalink=\"https:\/\/www.lavaprotocols.com\/2016\/06\/14\/bringing-device-work\/stats-byod\/\" data-orig-file=\"https:\/\/i0.wp.com\/www.lavaprotocols.com\/wp-content\/uploads\/2016\/06\/stats-byod.png?fit=557%2C326&#038;ssl=1\" data-orig-size=\"557,326\" data-comments-opened=\"0\" data-image-meta=\"{\"aperture\":\"0\",\"credit\":\"\",\"camera\":\"\",\"caption\":\"\",\"created_timestamp\":\"0\",\"copyright\":\"\",\"focal_length\":\"0\",\"iso\":\"0\",\"shutter_speed\":\"0\",\"title\":\"\",\"orientation\":\"0\"}\" data-image-title=\"stats byod\" data-image-description=\"\" data-image-caption=\"\n\n<p>This chart from StatCounter shows that the number of site visits via mobile has surpassed desktop views in Malaysia this year. It\u2019s a clear indication of the move that the nation as a whole is making into mobile devices. <\/p>\n<p>&#8221; data-medium-file=&#8221;https:\/\/i0.wp.com\/www.lavaprotocols.com\/wp-content\/uploads\/2016\/06\/stats-byod.png?fit=300%2C176&#038;ssl=1&#8243; data-large-file=&#8221;https:\/\/i0.wp.com\/www.lavaprotocols.com\/wp-content\/uploads\/2016\/06\/stats-byod.png?fit=557%2C326&#038;ssl=1&#8243; loading=&#8221;lazy&#8221; class=&#8221;wp-image-4808 size-full&#8221; src=&#8221;https:\/\/4843500.fs1.hubspotusercontent-na1.net\/hubfs\/4843500\/Imported_Blog_Media\/stats-byod-2.png&#8221; alt=&#8221;Culture of BYOD&#8221; width=&#8221;557&#8243; height=&#8221;326&#8243; srcset=&#8221;https:\/\/4843500.fs1.hubspotusercontent-na1.net\/hubfs\/4843500\/Imported_Blog_Media\/stats-byod-1.png 557w, https:\/\/4843500.fs1.hubspotusercontent-na1.net\/hubfs\/4843500\/Imported_Blog_Media\/stats-byod.png 300w&#8221; sizes=&#8221;(max-width: 557px) 100vw, 557px&#8221; data-recalc-dims=&#8221;1&#8243;><\/a><\/p>\n<p id=\"caption-attachment-4808\" class=\"wp-caption-text\"><em>This chart from StatCounter shows that the number of site visits via mobile has surpassed desktop views in Malaysia this year. It\u2019s a clear indication of the move that the nation as a whole is making into mobile devices.<\/em><\/p>\n<\/div>\n<p><span style=\"font-weight: 400;\">Throw in the consumerization of IT (where more and more office tools and apps are interchangeably used for both work and leisure) into the mix and you\u2019ll start to see the appeal of BYOD. But there are some aspects of this culture that both employees and employers should be aware of. <\/span><\/p>\n<h4><b>The Diminishing Security Line<br \/> <\/b><\/h4>\n<p><span style=\"font-weight: 400;\">20 years ago, companies were able to pinpoint exactly where their network started and where it ended but the same can\u2019t be said at present. Employees can plug in and out of their company network from virtually anywhere. This obviously increases the risk of loss of data because employers find it difficult to identify what are the systems or data that is being accessed by devices as well as to whom the device belongs to.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">But what makes things a little more difficult is that you as an employer can decide to not sanction BYOD but your employees can still find a way around it.<\/span><\/p>\n<h4><b>A Win-Win Agreement\u00a0<\/b><\/h4>\n<p><span style=\"font-weight: 400;\">So if you can\u2019t beat them, what are the<a href=\"https:\/\/lavaprotocols.com\/2016\/04\/19\/60-second-data-security-checklist\/\" target=\"_blank\" rel=\"noopener\"> security measures<\/a> employers need to implement to stop or limit potential loss and abuse of data?<br \/> <\/span><\/p>\n<p><span style=\"font-weight: 400;\">The Security for Business Innovation Council recommends employers to create a BYOD agreement with their employees that protects the rights of both the end user and the company prior to allowing access to the company network via the employee\u2019s mobile device. Some of the points they suggested to incorporate into the agreement includes:<\/span><\/p>\n<ul>\n<li style=\"font-weight: 400;\"><span style=\"font-weight: 400;\">Reporting and providing full details immediately if the mobile device is lost.<\/span><\/li>\n<li style=\"font-weight: 400;\"><span style=\"font-weight: 400;\">Granting the company full access to monitor and wipe the device and to not hold the company liable if the data is wiped off accidentally.<\/span><\/li>\n<li style=\"font-weight: 400;\"><span style=\"font-weight: 400;\">Establishing that end users are solely responsible for backing up any personal data.<\/span><\/li>\n<li style=\"font-weight: 400;\"><span style=\"font-weight: 400;\">Requiring the use of a corporate account to store corporate data in the cloud.<\/span><\/li>\n<li style=\"font-weight: 400;\"><span style=\"font-weight: 400;\">Laying out clear responsibilities of company and employees in terms of device maintenance, support and costs. \u00a0\u00a0<\/span><\/li>\n<li style=\"font-weight: 400;\"><span style=\"font-weight: 400;\">Requiring employees to remove apps when requested to by company<\/span><\/li>\n<li style=\"font-weight: 400;\"><span style=\"font-weight: 400;\">Denying access to company network if the a blacklisted app is installed or if the device is jailbroken or rooted.<\/span><\/li>\n<li style=\"font-weight: 400;\"><span style=\"font-weight: 400;\">Listing out consequences of violation<\/span><\/li>\n<\/ul>\n<p><span style=\"font-weight: 400;\">Network security company, Tenable in its BYOD and Mobile Security: 2016 Spotlight Report Results<\/span><span style=\"font-weight: 400;\"> listed <\/span><span style=\"font-weight: 400;\">the top three tools in managing mobile device security as mobile device management (43%), endpoint security tools (28%), Network Access Controls (27% ).<\/span><\/p>\n<h4><b>Absolute Control?<\/b><\/h4>\n<p><span style=\"font-weight: 400;\">Now if you\u2019re an employee, you would have backtracked a little at the \u201cfull access to monitor and wipe the device\u201d part. To not just give someone access to our mobile device but also the power to completely wipe out the data that\u2019s on it is downright unnerving simply because of how much we rely on our devices and the data stored within it. <\/span><\/p>\n<p><span style=\"font-weight: 400;\">In reality, employees are already sharing a large amount of personal data with their companies (human resource) \u2013 so is it then merely a matter of applying the same level of trust placed in the employer into protecting the data that\u2019s on the mobile device? This is somewhat subjective and depends on the user\u2019s view on data access. The solution to concerns regarding potential loss of personal data, given the vast availability of cloud storage tools, lies in regularly backing up the data on a mobile device.<\/span><\/p>\n<h4><b>Bottom Line\u00a0<\/b><\/h4>\n<p><span style=\"font-weight: 400;\">Try as they may to draw a security perimeter, if employers were to go that extra mile to implement strict access to data, it will make the entire workflow process rigid and thus inhibiting the user experience. And with more apps coming into existence, the implementation of BYOD is the sensible way forward. <\/span><\/p>\n<p><span style=\"font-weight: 400;\">Small to larger organizations have in the last five years made a leap to use suite of apps such as Google Apps. This move allows employees to manage their inbox, edit documents real time from different locations with their colleagues schedule meetings and locate information from anywhere outside their cubicle<\/span><span style=\"font-weight: 400;\">. <\/span><span style=\"font-weight: 400;\">Tenable also reported that apart from using mobile devices to access apps such as email, calendar and contact management, 45% of the respondents said they use it to access and edit documents, 43% to access intranets, and 28% to access Software as a Service apps such as Salesforce.com.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">The flexibility in choosing a device the employee is comfortable with as well as the lowered cost of investing and supporting equipments on the employer\u2019s part are just some of the reasons why companies are jumping aboard the BYOD ship. And a recent survey with 206 professionals from around the world by Tech Pro Research found that 72% of organizations surveyed were permitting BYOD or are planning to do so.<br \/> <\/span><br \/> <span style=\"font-weight: 400;\">Apart from the security factor which can trouble the minds of both the employer and employee, the BYOD culture is actually a great practice. It is up to the employer to implement and constantly educate its employees on how best to practice and safeguard its data as well as predict controls and settings in a manner that does not inhibit the efficiency that BYOD brings.<\/span><\/p>\n<p><em><strong>Written by\u00a0Ruba Nackreeran, \u00a0Corporate Communications and Legal Manager at Lava Protocols.<\/strong><\/em><\/p>\n<p><em>Article first appeared in <a href=\"https:\/\/lavaprotocols.com\/wp-content\/uploads\/2016\/06\/MM_20160511_24.pdf\" target=\"_blank\" rel=\"noopener\">The\u00a0Malay Mail<\/a>.<\/em><\/p>\n<p><i><span style=\"font-weight: 400;\">Lava is an authorised Cloud Partner of Google and is a <\/span><\/i><a href=\"https:\/\/lavaprotocols.com\/email-and-collaboration\/\"><i><span style=\"font-weight: 400;\">reseller of G Suite <\/span><\/i><\/a><i><span style=\"font-weight: 400;\">(previously known as Google Apps, Google Maps for Work, and Google Cloud Platform) in Malaysia. With more than a decade of experience in the industry, we\u2019re proud to say we\u2019re one of the leading cloud consultants and service providers in the Asia Pacific region.<\/span><\/i><\/p>\n<p><span class=\"et_bloom_bottom_trigger\"><\/span><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Is the practice of bringing your own device to work a perk or a setback? WE\u2019RE creatures of comfort and habit. As a result, the culture of BYOD was born.<\/p>\n","protected":false},"author":1,"featured_media":2783,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[1],"tags":[18,66],"class_list":["post-2782","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-uncategorized","tag-blog","tag-media-coverage"],"jetpack_featured_media_url":"https:\/\/www.lavaprotocols.com\/the-cloud-blog\/wp-content\/uploads\/2024\/10\/ipad-820272_640.jpg","_links":{"self":[{"href":"https:\/\/www.lavaprotocols.com\/the-cloud-blog\/wp-json\/wp\/v2\/posts\/2782","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.lavaprotocols.com\/the-cloud-blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.lavaprotocols.com\/the-cloud-blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.lavaprotocols.com\/the-cloud-blog\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.lavaprotocols.com\/the-cloud-blog\/wp-json\/wp\/v2\/comments?post=2782"}],"version-history":[{"count":0,"href":"https:\/\/www.lavaprotocols.com\/the-cloud-blog\/wp-json\/wp\/v2\/posts\/2782\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.lavaprotocols.com\/the-cloud-blog\/wp-json\/wp\/v2\/media\/2783"}],"wp:attachment":[{"href":"https:\/\/www.lavaprotocols.com\/the-cloud-blog\/wp-json\/wp\/v2\/media?parent=2782"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.lavaprotocols.com\/the-cloud-blog\/wp-json\/wp\/v2\/categories?post=2782"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.lavaprotocols.com\/the-cloud-blog\/wp-json\/wp\/v2\/tags?post=2782"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}