The approaching BYOD wave

By John Dix, Network World |  Consumerization of IT, BYOD

This holiday shopping season is being powered in part by demand for electronics, including boatloads of new tablets and smartphones, most of which will wash into enterprises in early January in a veritable bring-your-own-device (BYOD) tsunami.

Besides the latest and greatest smartphones, such as the sleek Samsung Galaxy S III, the Apple iPhone 5 and devices powered by Windows Phone 8, a raft of sexy new tablets will appear in the office, everything from the Apple iPad Mini to Google's Nexus 10, the Samsung Galaxy Tab 2, Microsoft's Surface and the Kindle Fire from Amazon.

GIFT GUIDE: Be a hero for the holidays

More than 75% of gift-giving adults plan to purchase consumer electronic products as gifts this year, according to the Consumer Electronics Association, and during Christmas alone some 32 million tablets will be sold in the U.S., up more than 110% from last year.

Chances are your organization isn't ready for the onslaught. In a Network World survey last summer only 16% of the participants said they have BYOD policies in place, which is a basic building block for BYOD given the need to spell out rules regarding use of personal devices to access corporate resources, security expectations and requirements, personal rights, etc.

If only 16% have taken this rudimentary step, we can assume companies: 1) are hoping against hope employees will heed the corporate ban against using personal devices for anything work related, 2) have faith that the security controls they have in place can prevent said use, 3) don't perceive it as much of a threat, 4) don't have a grasp of the magnitude of the problem or the risk, or 5) a mix of 1-4.

Anecdotal evidence would suggest that, other than highly secure organizations that are locked down, most organizations fall into the fifth camp. They realize BYOD is happening whether sanctioned or not, they have some controls in place that provide a bit of cover, but they either think the benefits outweigh the risks or simply aren't sure how much exposure they have.


Originally published on Network World |  Click here to read the original story.
Join us:
Facebook

Twitter

Pinterest

Tumblr

LinkedIn

Google+

Answers - Powered by ITworld

ITworld Answers helps you solve problems and share expertise. Ask a question or take a crack at answering the new questions below.

Join us:
Facebook

Twitter

Pinterest

Tumblr

LinkedIn

Google+

Ask a Question
randomness