READ TIME: 4 MIN
In our hyper-connected world, most of us have experienced some degree of blurring between “work” and “personal” spheres. An example of this phenomenon is bring-your-own-device (BYOD) work practices, which refers to the use of personal devices for work purposes. Although BYOD was initially somewhat controversial, it is now the norm rather than the exception. In fact, 83% of companies now allow at least some use of personal devices for work purposes1. As BYOD creates distinct cyber security risks, it is important to understand the nature of those risks and how to contain them.
Before discussing risks, it is worthwhile to consider the reasons that BYOD has become so prevalent. One of the main reasons that BYOD has taken off is because it enhances job satisfaction for employees who have strong device preferences—and this is a sizable portion of the workforce. Specifically, 50% of employees over the age of 30 expressed a strong preference for their own devices over those provided by their employer2.
Use of personal devices can also cut costs and create efficiencies for employers. Whether employees are working remotely or in the office, using familiar equipment is less stressful and reduces the time a company must invest in device-related training and troubleshooting. It also increases productivity by making it easier for employees to keep working while away from their desks; on average, a BYOD employee puts in an extra two hours each day3.
Cost savings of BYOD are also attractive to employers, especially to small and medium-sized businesses (SMBs) that have limited budgets. Studies have demonstrated that BYOD practices may save a company $350 to $1,300 per employee, per year4. Given these clear benefits, it’s easy to see why BYOD has caught on so widely; however, with these benefits come distinct cyber security risks.
In spite of the benefits, BYOD practices introduce a higher degree of cyber risk for businesses. This is because every device that connects to a company’s network (i.e., every endpoint) creates a new point of vulnerability for hackers to exploit. Illustrating this risk, 51% of data breaches have been attributed to employees’ personal devices5. Risk emerges from multiple points:
Whether your business formally sanctions BYOD practices or not, enacting protective strategies is the safest option. Here are important methods to consider:
With a range of solutions to defend against cyber threats of all types, NexusTek supports SMBs to take advantage of the benefits of BYOD practices while maintaining a robust cyber security posture.
Would you like to learn about cyber defense strategies to protect against BYOD-related risks?
References: