What is BYOD?

We explain what Bring Your Own Device means and how to implement a successful company strategy

Not many of us have been able to take our personal hardware anywhere over the last year, but that hasn’t stopped us from buying new laptops, Chromebooks, and smartphones. Recent Canalys research suggested Chromebook sales were “through the roof” as businesses sought cheap solutions to kit out remote employees.

When the ‘new normal’ is fully realised and we know where and when we will be working, those new devices may come with us under a Bring Your Own Device (BYOD) scheme. It was a growing trend in the years leading up to the pandemic where employees were encouraged to use personal devices in the workplace.

Part of its popularity was the consumerisation of IT with laptops, smartphones, and tablets having strong appeal with the general public. Many opt for the latest model of smartphone or the fastest laptop and often use them to check emails or chat with co-workers and employers.

What’s more, BYOD has coincided with an explosion of apps and SaaS tools, many of which can be easily installed on personal devices. While many will have a laptop provided by their employer, apps like Slack, Google Workspace, and Microsoft Office will often be installed on a personal smartphone, blurring the lines between our work and personal lives.

The benefits of BYOD

The most obvious benefits of BYOD include increased productivity and lower IT costs.

Employees who are able to choose their own device for work, whether that's a smartphone, tablet or computer are more motivated and that means they're more productive.

IT departments don't need to stump up the cash for new equipment or software licenses and employees are more likely to look after their equipment if it's their personal device too, so maintenance and repair costs will be lower.

Additionally, technology chosen by employees is likely to be more up to date than IT departments can offer everyone, which means they'll often feature faster processors, more advanced security such as fingerprint readers and can be used alongside the latest iterations of apps and software to ensure workers have the resources they need at all times.

Related Resource

The complete guide to changing your phone system provider

Optimise your phone system for better business results

How to change your phone system provider - whitepaper from AircallDownload now

In 2020, BYOD will have proven a boon to companies that have had to adopt mass remote working. While adoption of laptops has increased in recent years, not every employee in every organisation is equipped with one. When lockdown began, it may have taken time to kit workers out with suitable devices – assuming the organisation had the resources to do so. BYOD will have served as a great stopgap in some cases – in others, it will have become a new normal that has allowed businesses to continue operating with relative continuity over the long term.

The challenges of BYOD

What is probably the main challenge of a BYOD policy is the lack of homogeneity across staff devices. This means that IT departments might struggle with managing enterprise hardware, as some applications required to ensure the security and smooth operations of the business may not be compatible with different versions of operating systems. For example, some employees may prefer macOS over Windows, while others will opt for Android instead of iOS, making their unification more difficult than if everyone was provided with the exact same device and model.

This might also lead to increased IT support expenses, as instead of using one type of resource for all enterprise hardware, the IT department will be forced to source it from a few different providers. A good way to try to minimise this, according to GCHQ, is to provide employees with some limitations on the choice of hardware, such as a list of free or subsidised devices which they will be able to choose from.

Another significant challenge of a BYOD policy is maintaining the business’ cyber security posture. Unfortunately, this means that IT departments should be on the lookout for potential threats as well as gaps in the company’s MDM (mobile device management) policies. In order to ensure that device freedom doesn’t result in a company data breach, staff should be made aware of the potential threats of using a personal device at work, as well as educated on best security practices.

One nightmare scenario could involve an employee bringing in a virus-ridden device into the office and connecting it to the company’s network, potentially infecting other devices with malware.

BYOD is a security trade-off that must be weighed up and can put an extra burden on the IT department, which in turn could reduce productivity gains experienced by employees from other departments.

Key considerations before implementing a BYOD policy

Before you make the jump to BYOD, it's important whenever possible to ensure you have the policies in place before you invite employees to start introducing their personal devices into the corporate environment.

These include:

  • Having a list of devices your employees can and can't use. Although you should be as open as possible, do not permit devices with a poor security record. This may involve only permitting devices made by specific manufacturers or operating systems.
  • Enforce a stringent security policy for all devices, whether that's only permitting certain passwords (they must include a combination of uppercase and lowercase letters, at least one number and a symbol for example).
  • Invest in staff training so employees are aware of the risks if their device falls into the wrong hands.
  • Register each and every device that is being used for work, whether that's a smartphone, outside tablet, laptop, or even smartwatch.
  • Ensure your network can be locked down sufficiently to resist attacks and your infrastructure has the capacity to run BYOD.
  • Define which applications are allowed to be installed on devices and which aren't, or at least which can be run on your corporate network.
Featured Resources

BCDR buyer's guide for MSPs

How to choose a business continuity and disaster recovery solution

Download now

The definitive guide to IT security

Protecting your MSP and your customers

Download now

Cost of a data breach report 2020

Find out what factors help mitigate breach costs

Download now

The complete guide to changing your phone system provider

Optimise your phone system for better business results

Download now

Most Popular

KPMG offers staff 'four-day fortnight' in hybrid work plans
flexible working

KPMG offers staff 'four-day fortnight' in hybrid work plans

6 May 2021
How to move Windows 10 from your old hard drive to SSD
operating systems

How to move Windows 10 from your old hard drive to SSD

30 Apr 2021
16 ways to speed up your laptop

16 ways to speed up your laptop

29 Apr 2021