Employees and Employers Share the BYOD Burden
February 24, 2014
View infographic: Separating Corporate from Personal Data on Mobile Devices
Using your personal devices for work can make you feel like you’re living a double life. On one hand, you enjoy the convenience of having your own smartphone or tablet at work, but on the other, you’re indirectly allowing your work to have access to your personal data. Just how do you keep those separate and keep your privacy intact? This bring-your-own-device (BYOD) trend is not only tricky for employees like you; companies also face challenges in adopting BYOD.Gartner predicts that 50% of employers will embrace BYOD by 2017. These employers believe that BYOD enhances employee productivity. What they may not be fully aware of are the risks that come with this measure. About 2 in 5 large data breaches are caused by lost or stolen employee devices, and roughly 3 in 10 employees with company data stored on unsanctioned Web services are responsible for security breaches.
To maximize the benefits of BYOD without increasing the risks, companies and their employees need to strike a balance between maintaining employee privacy and having control over corporate data on devices. Employers, for example, can set clear guidelines or BYOD policies that employees need to follow to avoid corporate data from spilling out. Employees, on the other hand, need to abide by these rules but make sure that their own data is safe from prying eyes.
More is discussed in Split Screen, an interactive infographic detailing the steps companies can take to protect their data and that of their employees.
HIDE
Like it? Add this infographic to your site:
1. Click on the box below. 2. Press Ctrl+A to select all. 3. Press Ctrl+C to copy. 4. Paste the code into your page (Ctrl+V).
Image will appear the same size as you see above.
Recent Posts
- Countering AI-Driven Threats With AI-Powered Defense
- Intercepting Impact: 2024 Trend Micro Cyber Risk Report
- The Illusion of Choice: Uncovering Electoral Deceptions in the Age of AI
- Navigating Risk Management: How Red Teaming Can Prepare Your Team for Actual Cyber Attacks
- UNWIRED: Understanding the Unforeseen Risks in Evolving Communication Channels