SlideShare a Scribd company logo
The Impact of the “Bring Your Own Device”
(BYOD) Trend in the Workplace
By Paul Van Essche
•Mobile research, analysis, and forecasting provider Juniper Research
recently reported that the present trend of employees bringing personal
mobile devices to the workplace is anticipated to double to 350 million
users by 2014.
While this trend towards corporate tolerance of worker resources carries
productivity benefits, it also creates a number of security concerns.
•At the forefront of this trend is a generation of young knowledge
workers who expect corporate policies that allow them to bring personal
devices to work, and have these devices interact with corporate systems,
for both professional and personal use.
In a surprising global survey by Fortinet, over half of 3,000 employees in
their 20s felt that BYOD was more of a right than a privilege.
Furthermore, one-third indicated a willingness to violate any company
policies that constrain their use of personal devices in the workplace.
•In their recent Insurance Journal article “Mobile Device Explosion in the
Workplace Creates Need for Heightened Security,” co-authors Kathleen
Ellis and Ken Goldstein cited a Dimensional Research survey of
information technology professionals.
Leading IT managers indicated that 65 percent permitted personal device
connections to their enterprise networks.
•Of those, 47 percent indicated that customer data was transferred via
employee-owned devices, and 71 percent felt such personal devices
contributed to security issues.
While the BYOD trend is more prominent in the private than public
sector, it will nonetheless require all organizations to study and revise
security management policies as personal devices become ubiquitous in
the workplace.
•About the Author:
At the helm of van Essche & Associates, Paul Van Essche is a broadly
experienced business consultant in areas including information
technology, finance, and change management, among others.
For more information about Mr. Van Essche, visit his website at
www.vanessche.com.
www.vanessche.com
The impact of the bring your own device byod trend in the workplace

More Related Content

What's hot

Global Tech Jam: I3 Intelligent IoT Integrator.
Global Tech Jam: I3 Intelligent IoT Integrator.Global Tech Jam: I3 Intelligent IoT Integrator.
Global Tech Jam: I3 Intelligent IoT Integrator.
inside-BigData.com
 
British sm es risk data loss & downtime due
British sm es risk data loss & downtime dueBritish sm es risk data loss & downtime due
British sm es risk data loss & downtime due
Cloud Computing IT Services
 
BYOD: Implementation and Security Issues
BYOD: Implementation and Security IssuesBYOD: Implementation and Security Issues
BYOD: Implementation and Security Issues
Harsh Kishore Mishra
 
"Technology, Ethics, and Social Work"
"Technology, Ethics, and Social Work""Technology, Ethics, and Social Work"
"Technology, Ethics, and Social Work"
Tawny Brown
 
Going_Mobile_101_IIMC_v5
Going_Mobile_101_IIMC_v5Going_Mobile_101_IIMC_v5
Going_Mobile_101_IIMC_v5
Steve Markey
 
Still Careless Users In The Cloud - Research Study
Still Careless Users In The Cloud - Research StudyStill Careless Users In The Cloud - Research Study
Still Careless Users In The Cloud - Research Study
Softchoice Corporation
 
Pragmatic Devops
Pragmatic DevopsPragmatic Devops
Pragmatic Devops
Nic Cheneweth
 
Intelclinic - NeuroOn
Intelclinic - NeuroOnIntelclinic - NeuroOn
Intelclinic - NeuroOn
Intelclinic
 
Student Mobile Workspaces Infographic
Student Mobile Workspaces InfographicStudent Mobile Workspaces Infographic
Student Mobile Workspaces Infographic
Citrix
 
Extending applications securely to wireless health workers.
Extending applications securely to wireless health workers.Extending applications securely to wireless health workers.
Extending applications securely to wireless health workers.
Wheatstone
 
Mobile Workspaces Go Where You Go [Infographic]
Mobile Workspaces Go Where You Go [Infographic]Mobile Workspaces Go Where You Go [Infographic]
Mobile Workspaces Go Where You Go [Infographic]
Citrix
 
A Survey of SM usage in the workplace - Preliminary Findings
A Survey of SM usage in the workplace-Preliminary FindingsA Survey of SM usage in the workplace-Preliminary Findings
A Survey of SM usage in the workplace - Preliminary Findings
twintangibles
 
Proposed T-Model to cover 4S quality metrics based on empirical study of root...
Proposed T-Model to cover 4S quality metrics based on empirical study of root...Proposed T-Model to cover 4S quality metrics based on empirical study of root...
Proposed T-Model to cover 4S quality metrics based on empirical study of root...
IJECEIAES
 
Virtual Space Race: How IT with The Right Stuff Creates a Competitive Advantage
Virtual Space Race: How IT with The Right Stuff Creates a Competitive AdvantageVirtual Space Race: How IT with The Right Stuff Creates a Competitive Advantage
Virtual Space Race: How IT with The Right Stuff Creates a Competitive Advantage
Softchoice Corporation
 
Managing applications in the age of BYOA: Reclaiming IT’s strategic role
Managing applications in the age of BYOA: Reclaiming IT’s strategic role Managing applications in the age of BYOA: Reclaiming IT’s strategic role
Managing applications in the age of BYOA: Reclaiming IT’s strategic role
LogMeIn
 
Bring Your Own Device
Bring Your Own Device Bring Your Own Device
End-User Computing Insights: A study of digital maturity
End-User Computing Insights: A study of digital maturityEnd-User Computing Insights: A study of digital maturity
End-User Computing Insights: A study of digital maturity
DImension Data
 
ESG TechTruth: Advanced Persistent Threat: The Pervasive IT Security Skills S...
ESG TechTruth: Advanced Persistent Threat: The Pervasive IT Security Skills S...ESG TechTruth: Advanced Persistent Threat: The Pervasive IT Security Skills S...
ESG TechTruth: Advanced Persistent Threat: The Pervasive IT Security Skills S...
Enterprise Strategy Group
 
Internet of Things
Internet of ThingsInternet of Things
Internet of Things
Mphasis
 
ASTM Standards Intellectual Property
ASTM Standards Intellectual PropertyASTM Standards Intellectual Property
ASTM Standards Intellectual Property
jaykg64
 

What's hot (20)

Global Tech Jam: I3 Intelligent IoT Integrator.
Global Tech Jam: I3 Intelligent IoT Integrator.Global Tech Jam: I3 Intelligent IoT Integrator.
Global Tech Jam: I3 Intelligent IoT Integrator.
 
British sm es risk data loss & downtime due
British sm es risk data loss & downtime dueBritish sm es risk data loss & downtime due
British sm es risk data loss & downtime due
 
BYOD: Implementation and Security Issues
BYOD: Implementation and Security IssuesBYOD: Implementation and Security Issues
BYOD: Implementation and Security Issues
 
"Technology, Ethics, and Social Work"
"Technology, Ethics, and Social Work""Technology, Ethics, and Social Work"
"Technology, Ethics, and Social Work"
 
Going_Mobile_101_IIMC_v5
Going_Mobile_101_IIMC_v5Going_Mobile_101_IIMC_v5
Going_Mobile_101_IIMC_v5
 
Still Careless Users In The Cloud - Research Study
Still Careless Users In The Cloud - Research StudyStill Careless Users In The Cloud - Research Study
Still Careless Users In The Cloud - Research Study
 
Pragmatic Devops
Pragmatic DevopsPragmatic Devops
Pragmatic Devops
 
Intelclinic - NeuroOn
Intelclinic - NeuroOnIntelclinic - NeuroOn
Intelclinic - NeuroOn
 
Student Mobile Workspaces Infographic
Student Mobile Workspaces InfographicStudent Mobile Workspaces Infographic
Student Mobile Workspaces Infographic
 
Extending applications securely to wireless health workers.
Extending applications securely to wireless health workers.Extending applications securely to wireless health workers.
Extending applications securely to wireless health workers.
 
Mobile Workspaces Go Where You Go [Infographic]
Mobile Workspaces Go Where You Go [Infographic]Mobile Workspaces Go Where You Go [Infographic]
Mobile Workspaces Go Where You Go [Infographic]
 
A Survey of SM usage in the workplace - Preliminary Findings
A Survey of SM usage in the workplace-Preliminary FindingsA Survey of SM usage in the workplace-Preliminary Findings
A Survey of SM usage in the workplace - Preliminary Findings
 
Proposed T-Model to cover 4S quality metrics based on empirical study of root...
Proposed T-Model to cover 4S quality metrics based on empirical study of root...Proposed T-Model to cover 4S quality metrics based on empirical study of root...
Proposed T-Model to cover 4S quality metrics based on empirical study of root...
 
Virtual Space Race: How IT with The Right Stuff Creates a Competitive Advantage
Virtual Space Race: How IT with The Right Stuff Creates a Competitive AdvantageVirtual Space Race: How IT with The Right Stuff Creates a Competitive Advantage
Virtual Space Race: How IT with The Right Stuff Creates a Competitive Advantage
 
Managing applications in the age of BYOA: Reclaiming IT’s strategic role
Managing applications in the age of BYOA: Reclaiming IT’s strategic role Managing applications in the age of BYOA: Reclaiming IT’s strategic role
Managing applications in the age of BYOA: Reclaiming IT’s strategic role
 
Bring Your Own Device
Bring Your Own Device Bring Your Own Device
Bring Your Own Device
 
End-User Computing Insights: A study of digital maturity
End-User Computing Insights: A study of digital maturityEnd-User Computing Insights: A study of digital maturity
End-User Computing Insights: A study of digital maturity
 
ESG TechTruth: Advanced Persistent Threat: The Pervasive IT Security Skills S...
ESG TechTruth: Advanced Persistent Threat: The Pervasive IT Security Skills S...ESG TechTruth: Advanced Persistent Threat: The Pervasive IT Security Skills S...
ESG TechTruth: Advanced Persistent Threat: The Pervasive IT Security Skills S...
 
Internet of Things
Internet of ThingsInternet of Things
Internet of Things
 
ASTM Standards Intellectual Property
ASTM Standards Intellectual PropertyASTM Standards Intellectual Property
ASTM Standards Intellectual Property
 

Viewers also liked

Invitation for new_year_party_2013
Invitation for new_year_party_2013Invitation for new_year_party_2013
Invitation for new_year_party_2013
Manoranjan Mishra
 
Romero britto
Romero brittoRomero britto
Romero britto
infoleo
 
How to make dvd final version
How to make dvd final versionHow to make dvd final version
How to make dvd final version
SarahNoble1994
 
Google can help generate hundreds of millions for schools by adding this prod...
Google can help generate hundreds of millions for schools by adding this prod...Google can help generate hundreds of millions for schools by adding this prod...
Google can help generate hundreds of millions for schools by adding this prod...
Front Door Software Corp
 
Ua uk lr_gv_mappe_cover_indd
Ua uk lr_gv_mappe_cover_inddUa uk lr_gv_mappe_cover_indd
Ua uk lr_gv_mappe_cover_inddSergey Martinez
 
Education software providers can add FrontDoorSoftware to generate millions o...
Education software providers can add FrontDoorSoftware to generate millions o...Education software providers can add FrontDoorSoftware to generate millions o...
Education software providers can add FrontDoorSoftware to generate millions o...
Front Door Software Corp
 

Viewers also liked (6)

Invitation for new_year_party_2013
Invitation for new_year_party_2013Invitation for new_year_party_2013
Invitation for new_year_party_2013
 
Romero britto
Romero brittoRomero britto
Romero britto
 
How to make dvd final version
How to make dvd final versionHow to make dvd final version
How to make dvd final version
 
Google can help generate hundreds of millions for schools by adding this prod...
Google can help generate hundreds of millions for schools by adding this prod...Google can help generate hundreds of millions for schools by adding this prod...
Google can help generate hundreds of millions for schools by adding this prod...
 
Ua uk lr_gv_mappe_cover_indd
Ua uk lr_gv_mappe_cover_inddUa uk lr_gv_mappe_cover_indd
Ua uk lr_gv_mappe_cover_indd
 
Education software providers can add FrontDoorSoftware to generate millions o...
Education software providers can add FrontDoorSoftware to generate millions o...Education software providers can add FrontDoorSoftware to generate millions o...
Education software providers can add FrontDoorSoftware to generate millions o...
 

Similar to The impact of the bring your own device byod trend in the workplace

Managing BYOD in Corporate Environments
Managing BYOD in Corporate EnvironmentsManaging BYOD in Corporate Environments
Managing BYOD in Corporate Environments
Osterman Research, Inc.
 
Cybersecurity in the Age of Mobility
Cybersecurity in the Age of MobilityCybersecurity in the Age of Mobility
Cybersecurity in the Age of Mobility
Booz Allen Hamilton
 
Juniper Trusted Mobility Index 2012
Juniper Trusted Mobility Index 2012Juniper Trusted Mobility Index 2012
Juniper Trusted Mobility Index 2012
Juniper Networks
 
The impact of mobile devices on information security
The impact of mobile devices on information securityThe impact of mobile devices on information security
The impact of mobile devices on information security
Bee_Ware
 
The Workplace of Things
The Workplace of ThingsThe Workplace of Things
The need for IT to get in front of the BYOD (Bring Your Own Device) problem
The need for IT to get in front of the BYOD (Bring Your Own Device) problemThe need for IT to get in front of the BYOD (Bring Your Own Device) problem
The need for IT to get in front of the BYOD (Bring Your Own Device) problem
Iron Mountain
 
It consumerisation presentation
It  consumerisation presentationIt  consumerisation presentation
It consumerisation presentation
revaathey
 
It consumerisation presentation
It  consumerisation presentationIt  consumerisation presentation
It consumerisation presentation
revaathey
 
Navigating the Flood of BYOD
Navigating the Flood of BYODNavigating the Flood of BYOD
Survey Report: Managing BYOD in Corporate Environments
Survey Report: Managing BYOD in Corporate EnvironmentsSurvey Report: Managing BYOD in Corporate Environments
Survey Report: Managing BYOD in Corporate Environments
Osterman Research, Inc.
 
The Impact of the Consumerization of IT on the Public Sector
The Impact of the Consumerization of IT on the Public SectorThe Impact of the Consumerization of IT on the Public Sector
The Impact of the Consumerization of IT on the Public Sector
GovLoop
 
2010 GISS EY
2010 GISS EY2010 GISS EY
2010 GISS EY
Vladimir Matviychuk
 
VMware Model for Enterprise Mobility
VMware Model for Enterprise MobilityVMware Model for Enterprise Mobility
VMware Model for Enterprise Mobility
VMware
 
Consumer tech invasion
Consumer tech invasionConsumer tech invasion
Consumer tech invasion
Info-Tech Research Group
 
BYOD SCOPE: A Study of Corporate Policies in Pakistan
BYOD SCOPE: A Study of Corporate Policies in PakistanBYOD SCOPE: A Study of Corporate Policies in Pakistan
BYOD SCOPE: A Study of Corporate Policies in Pakistan
Shuja Ahmad
 
Bring Your Own Device (BYOD)
Bring Your Own Device (BYOD)Bring Your Own Device (BYOD)
Bring Your Own Device (BYOD)
Murray Security Services
 
BYOD: A Global Perspective
BYOD: A Global PerspectiveBYOD: A Global Perspective
BYOD: A Global Perspective
Joseph M Bradley
 
“The Impact of Mobile Devices on Information Security: A Survey of IT and Sec...
“The Impact of Mobile Devices on Information Security: A Survey of IT and Sec...“The Impact of Mobile Devices on Information Security: A Survey of IT and Sec...
“The Impact of Mobile Devices on Information Security: A Survey of IT and Sec...
Thierry Labro
 
Reese ICT4902 Information Overload
Reese ICT4902 Information OverloadReese ICT4902 Information Overload
Reese ICT4902 Information Overload
Michael Reese
 
Unisys Security Insights Infographic: Global
Unisys Security Insights Infographic: GlobalUnisys Security Insights Infographic: Global
Unisys Security Insights Infographic: Global
Unisys Corporation
 

Similar to The impact of the bring your own device byod trend in the workplace (20)

Managing BYOD in Corporate Environments
Managing BYOD in Corporate EnvironmentsManaging BYOD in Corporate Environments
Managing BYOD in Corporate Environments
 
Cybersecurity in the Age of Mobility
Cybersecurity in the Age of MobilityCybersecurity in the Age of Mobility
Cybersecurity in the Age of Mobility
 
Juniper Trusted Mobility Index 2012
Juniper Trusted Mobility Index 2012Juniper Trusted Mobility Index 2012
Juniper Trusted Mobility Index 2012
 
The impact of mobile devices on information security
The impact of mobile devices on information securityThe impact of mobile devices on information security
The impact of mobile devices on information security
 
The Workplace of Things
The Workplace of ThingsThe Workplace of Things
The Workplace of Things
 
The need for IT to get in front of the BYOD (Bring Your Own Device) problem
The need for IT to get in front of the BYOD (Bring Your Own Device) problemThe need for IT to get in front of the BYOD (Bring Your Own Device) problem
The need for IT to get in front of the BYOD (Bring Your Own Device) problem
 
It consumerisation presentation
It  consumerisation presentationIt  consumerisation presentation
It consumerisation presentation
 
It consumerisation presentation
It  consumerisation presentationIt  consumerisation presentation
It consumerisation presentation
 
Navigating the Flood of BYOD
Navigating the Flood of BYODNavigating the Flood of BYOD
Navigating the Flood of BYOD
 
Survey Report: Managing BYOD in Corporate Environments
Survey Report: Managing BYOD in Corporate EnvironmentsSurvey Report: Managing BYOD in Corporate Environments
Survey Report: Managing BYOD in Corporate Environments
 
The Impact of the Consumerization of IT on the Public Sector
The Impact of the Consumerization of IT on the Public SectorThe Impact of the Consumerization of IT on the Public Sector
The Impact of the Consumerization of IT on the Public Sector
 
2010 GISS EY
2010 GISS EY2010 GISS EY
2010 GISS EY
 
VMware Model for Enterprise Mobility
VMware Model for Enterprise MobilityVMware Model for Enterprise Mobility
VMware Model for Enterprise Mobility
 
Consumer tech invasion
Consumer tech invasionConsumer tech invasion
Consumer tech invasion
 
BYOD SCOPE: A Study of Corporate Policies in Pakistan
BYOD SCOPE: A Study of Corporate Policies in PakistanBYOD SCOPE: A Study of Corporate Policies in Pakistan
BYOD SCOPE: A Study of Corporate Policies in Pakistan
 
Bring Your Own Device (BYOD)
Bring Your Own Device (BYOD)Bring Your Own Device (BYOD)
Bring Your Own Device (BYOD)
 
BYOD: A Global Perspective
BYOD: A Global PerspectiveBYOD: A Global Perspective
BYOD: A Global Perspective
 
“The Impact of Mobile Devices on Information Security: A Survey of IT and Sec...
“The Impact of Mobile Devices on Information Security: A Survey of IT and Sec...“The Impact of Mobile Devices on Information Security: A Survey of IT and Sec...
“The Impact of Mobile Devices on Information Security: A Survey of IT and Sec...
 
Reese ICT4902 Information Overload
Reese ICT4902 Information OverloadReese ICT4902 Information Overload
Reese ICT4902 Information Overload
 
Unisys Security Insights Infographic: Global
Unisys Security Insights Infographic: GlobalUnisys Security Insights Infographic: Global
Unisys Security Insights Infographic: Global
 

Recently uploaded

Part 2 Deep Dive: Navigating the 2024 Slowdown
Part 2 Deep Dive: Navigating the 2024 SlowdownPart 2 Deep Dive: Navigating the 2024 Slowdown
Part 2 Deep Dive: Navigating the 2024 Slowdown
jeffkluth1
 
Digital Transformation Frameworks: Driving Digital Excellence
Digital Transformation Frameworks: Driving Digital ExcellenceDigital Transformation Frameworks: Driving Digital Excellence
Digital Transformation Frameworks: Driving Digital Excellence
Operational Excellence Consulting
 
Anny Serafina Love - Letter of Recommendation by Kellen Harkins, MS.
Anny Serafina Love - Letter of Recommendation by Kellen Harkins, MS.Anny Serafina Love - Letter of Recommendation by Kellen Harkins, MS.
Anny Serafina Love - Letter of Recommendation by Kellen Harkins, MS.
AnnySerafinaLove
 
Unveiling the Dynamic Personalities, Key Dates, and Horoscope Insights: Gemin...
Unveiling the Dynamic Personalities, Key Dates, and Horoscope Insights: Gemin...Unveiling the Dynamic Personalities, Key Dates, and Horoscope Insights: Gemin...
Unveiling the Dynamic Personalities, Key Dates, and Horoscope Insights: Gemin...
my Pandit
 
Call 8867766396 Satta Matka Dpboss Matka Guessing Satta batta Matka 420 Satta...
Call 8867766396 Satta Matka Dpboss Matka Guessing Satta batta Matka 420 Satta...Call 8867766396 Satta Matka Dpboss Matka Guessing Satta batta Matka 420 Satta...
Call 8867766396 Satta Matka Dpboss Matka Guessing Satta batta Matka 420 Satta...
bosssp10
 
How are Lilac French Bulldogs Beauty Charming the World and Capturing Hearts....
How are Lilac French Bulldogs Beauty Charming the World and Capturing Hearts....How are Lilac French Bulldogs Beauty Charming the World and Capturing Hearts....
How are Lilac French Bulldogs Beauty Charming the World and Capturing Hearts....
Lacey Max
 
Hamster Kombat' Telegram Game Surpasses 100 Million Players—Token Release Sch...
Hamster Kombat' Telegram Game Surpasses 100 Million Players—Token Release Sch...Hamster Kombat' Telegram Game Surpasses 100 Million Players—Token Release Sch...
Hamster Kombat' Telegram Game Surpasses 100 Million Players—Token Release Sch...
SOFTTECHHUB
 
HOW TO START UP A COMPANY A STEP-BY-STEP GUIDE.pdf
HOW TO START UP A COMPANY A STEP-BY-STEP GUIDE.pdfHOW TO START UP A COMPANY A STEP-BY-STEP GUIDE.pdf
HOW TO START UP A COMPANY A STEP-BY-STEP GUIDE.pdf
46adnanshahzad
 
Industrial Tech SW: Category Renewal and Creation
Industrial Tech SW:  Category Renewal and CreationIndustrial Tech SW:  Category Renewal and Creation
Industrial Tech SW: Category Renewal and Creation
Christian Dahlen
 
Building Your Employer Brand with Social Media
Building Your Employer Brand with Social MediaBuilding Your Employer Brand with Social Media
Building Your Employer Brand with Social Media
LuanWise
 
Satta Matka Dpboss Matka Guessing Kalyan Chart Indian Matka Kalyan panel Chart
Satta Matka Dpboss Matka Guessing Kalyan Chart Indian Matka Kalyan panel ChartSatta Matka Dpboss Matka Guessing Kalyan Chart Indian Matka Kalyan panel Chart
Satta Matka Dpboss Matka Guessing Kalyan Chart Indian Matka Kalyan panel Chart
➒➌➎➏➑➐➋➑➐➐Dpboss Matka Guessing Satta Matka Kalyan Chart Indian Matka
 
How to Implement a Real Estate CRM Software
How to Implement a Real Estate CRM SoftwareHow to Implement a Real Estate CRM Software
How to Implement a Real Estate CRM Software
SalesTown
 
Taurus Zodiac Sign: Unveiling the Traits, Dates, and Horoscope Insights of th...
Taurus Zodiac Sign: Unveiling the Traits, Dates, and Horoscope Insights of th...Taurus Zodiac Sign: Unveiling the Traits, Dates, and Horoscope Insights of th...
Taurus Zodiac Sign: Unveiling the Traits, Dates, and Horoscope Insights of th...
my Pandit
 
How to Implement a Strategy: Transform Your Strategy with BSC Designer's Comp...
How to Implement a Strategy: Transform Your Strategy with BSC Designer's Comp...How to Implement a Strategy: Transform Your Strategy with BSC Designer's Comp...
How to Implement a Strategy: Transform Your Strategy with BSC Designer's Comp...
Aleksey Savkin
 
How MJ Global Leads the Packaging Industry.pdf
How MJ Global Leads the Packaging Industry.pdfHow MJ Global Leads the Packaging Industry.pdf
How MJ Global Leads the Packaging Industry.pdf
MJ Global
 
Digital Marketing with a Focus on Sustainability
Digital Marketing with a Focus on SustainabilityDigital Marketing with a Focus on Sustainability
Digital Marketing with a Focus on Sustainability
sssourabhsharma
 
The APCO Geopolitical Radar - Q3 2024 The Global Operating Environment for Bu...
The APCO Geopolitical Radar - Q3 2024 The Global Operating Environment for Bu...The APCO Geopolitical Radar - Q3 2024 The Global Operating Environment for Bu...
The APCO Geopolitical Radar - Q3 2024 The Global Operating Environment for Bu...
APCO
 
Chapter 7 Final business management sciences .ppt
Chapter 7 Final business management sciences .pptChapter 7 Final business management sciences .ppt
Chapter 7 Final business management sciences .ppt
ssuser567e2d
 
Top mailing list providers in the USA.pptx
Top mailing list providers in the USA.pptxTop mailing list providers in the USA.pptx
Top mailing list providers in the USA.pptx
JeremyPeirce1
 
3 Simple Steps To Buy Verified Payoneer Account In 2024
3 Simple Steps To Buy Verified Payoneer Account In 20243 Simple Steps To Buy Verified Payoneer Account In 2024
3 Simple Steps To Buy Verified Payoneer Account In 2024
SEOSMMEARTH
 

Recently uploaded (20)

Part 2 Deep Dive: Navigating the 2024 Slowdown
Part 2 Deep Dive: Navigating the 2024 SlowdownPart 2 Deep Dive: Navigating the 2024 Slowdown
Part 2 Deep Dive: Navigating the 2024 Slowdown
 
Digital Transformation Frameworks: Driving Digital Excellence
Digital Transformation Frameworks: Driving Digital ExcellenceDigital Transformation Frameworks: Driving Digital Excellence
Digital Transformation Frameworks: Driving Digital Excellence
 
Anny Serafina Love - Letter of Recommendation by Kellen Harkins, MS.
Anny Serafina Love - Letter of Recommendation by Kellen Harkins, MS.Anny Serafina Love - Letter of Recommendation by Kellen Harkins, MS.
Anny Serafina Love - Letter of Recommendation by Kellen Harkins, MS.
 
Unveiling the Dynamic Personalities, Key Dates, and Horoscope Insights: Gemin...
Unveiling the Dynamic Personalities, Key Dates, and Horoscope Insights: Gemin...Unveiling the Dynamic Personalities, Key Dates, and Horoscope Insights: Gemin...
Unveiling the Dynamic Personalities, Key Dates, and Horoscope Insights: Gemin...
 
Call 8867766396 Satta Matka Dpboss Matka Guessing Satta batta Matka 420 Satta...
Call 8867766396 Satta Matka Dpboss Matka Guessing Satta batta Matka 420 Satta...Call 8867766396 Satta Matka Dpboss Matka Guessing Satta batta Matka 420 Satta...
Call 8867766396 Satta Matka Dpboss Matka Guessing Satta batta Matka 420 Satta...
 
How are Lilac French Bulldogs Beauty Charming the World and Capturing Hearts....
How are Lilac French Bulldogs Beauty Charming the World and Capturing Hearts....How are Lilac French Bulldogs Beauty Charming the World and Capturing Hearts....
How are Lilac French Bulldogs Beauty Charming the World and Capturing Hearts....
 
Hamster Kombat' Telegram Game Surpasses 100 Million Players—Token Release Sch...
Hamster Kombat' Telegram Game Surpasses 100 Million Players—Token Release Sch...Hamster Kombat' Telegram Game Surpasses 100 Million Players—Token Release Sch...
Hamster Kombat' Telegram Game Surpasses 100 Million Players—Token Release Sch...
 
HOW TO START UP A COMPANY A STEP-BY-STEP GUIDE.pdf
HOW TO START UP A COMPANY A STEP-BY-STEP GUIDE.pdfHOW TO START UP A COMPANY A STEP-BY-STEP GUIDE.pdf
HOW TO START UP A COMPANY A STEP-BY-STEP GUIDE.pdf
 
Industrial Tech SW: Category Renewal and Creation
Industrial Tech SW:  Category Renewal and CreationIndustrial Tech SW:  Category Renewal and Creation
Industrial Tech SW: Category Renewal and Creation
 
Building Your Employer Brand with Social Media
Building Your Employer Brand with Social MediaBuilding Your Employer Brand with Social Media
Building Your Employer Brand with Social Media
 
Satta Matka Dpboss Matka Guessing Kalyan Chart Indian Matka Kalyan panel Chart
Satta Matka Dpboss Matka Guessing Kalyan Chart Indian Matka Kalyan panel ChartSatta Matka Dpboss Matka Guessing Kalyan Chart Indian Matka Kalyan panel Chart
Satta Matka Dpboss Matka Guessing Kalyan Chart Indian Matka Kalyan panel Chart
 
How to Implement a Real Estate CRM Software
How to Implement a Real Estate CRM SoftwareHow to Implement a Real Estate CRM Software
How to Implement a Real Estate CRM Software
 
Taurus Zodiac Sign: Unveiling the Traits, Dates, and Horoscope Insights of th...
Taurus Zodiac Sign: Unveiling the Traits, Dates, and Horoscope Insights of th...Taurus Zodiac Sign: Unveiling the Traits, Dates, and Horoscope Insights of th...
Taurus Zodiac Sign: Unveiling the Traits, Dates, and Horoscope Insights of th...
 
How to Implement a Strategy: Transform Your Strategy with BSC Designer's Comp...
How to Implement a Strategy: Transform Your Strategy with BSC Designer's Comp...How to Implement a Strategy: Transform Your Strategy with BSC Designer's Comp...
How to Implement a Strategy: Transform Your Strategy with BSC Designer's Comp...
 
How MJ Global Leads the Packaging Industry.pdf
How MJ Global Leads the Packaging Industry.pdfHow MJ Global Leads the Packaging Industry.pdf
How MJ Global Leads the Packaging Industry.pdf
 
Digital Marketing with a Focus on Sustainability
Digital Marketing with a Focus on SustainabilityDigital Marketing with a Focus on Sustainability
Digital Marketing with a Focus on Sustainability
 
The APCO Geopolitical Radar - Q3 2024 The Global Operating Environment for Bu...
The APCO Geopolitical Radar - Q3 2024 The Global Operating Environment for Bu...The APCO Geopolitical Radar - Q3 2024 The Global Operating Environment for Bu...
The APCO Geopolitical Radar - Q3 2024 The Global Operating Environment for Bu...
 
Chapter 7 Final business management sciences .ppt
Chapter 7 Final business management sciences .pptChapter 7 Final business management sciences .ppt
Chapter 7 Final business management sciences .ppt
 
Top mailing list providers in the USA.pptx
Top mailing list providers in the USA.pptxTop mailing list providers in the USA.pptx
Top mailing list providers in the USA.pptx
 
3 Simple Steps To Buy Verified Payoneer Account In 2024
3 Simple Steps To Buy Verified Payoneer Account In 20243 Simple Steps To Buy Verified Payoneer Account In 2024
3 Simple Steps To Buy Verified Payoneer Account In 2024
 

The impact of the bring your own device byod trend in the workplace

  • 1. The Impact of the “Bring Your Own Device” (BYOD) Trend in the Workplace By Paul Van Essche
  • 2. •Mobile research, analysis, and forecasting provider Juniper Research recently reported that the present trend of employees bringing personal mobile devices to the workplace is anticipated to double to 350 million users by 2014. While this trend towards corporate tolerance of worker resources carries productivity benefits, it also creates a number of security concerns.
  • 3. •At the forefront of this trend is a generation of young knowledge workers who expect corporate policies that allow them to bring personal devices to work, and have these devices interact with corporate systems, for both professional and personal use. In a surprising global survey by Fortinet, over half of 3,000 employees in their 20s felt that BYOD was more of a right than a privilege. Furthermore, one-third indicated a willingness to violate any company policies that constrain their use of personal devices in the workplace.
  • 4. •In their recent Insurance Journal article “Mobile Device Explosion in the Workplace Creates Need for Heightened Security,” co-authors Kathleen Ellis and Ken Goldstein cited a Dimensional Research survey of information technology professionals. Leading IT managers indicated that 65 percent permitted personal device connections to their enterprise networks.
  • 5. •Of those, 47 percent indicated that customer data was transferred via employee-owned devices, and 71 percent felt such personal devices contributed to security issues. While the BYOD trend is more prominent in the private than public sector, it will nonetheless require all organizations to study and revise security management policies as personal devices become ubiquitous in the workplace.
  • 6. •About the Author: At the helm of van Essche & Associates, Paul Van Essche is a broadly experienced business consultant in areas including information technology, finance, and change management, among others. For more information about Mr. Van Essche, visit his website at www.vanessche.com. www.vanessche.com