Employees and Employers Share the BYOD Burden
February 24, 2014
View infographic: Separating Corporate from Personal Data on Mobile DevicesUsing your personal devices for work can make you feel like you’re living a double life. On one hand, you enjoy the convenience of having your own smartphone or tablet at work, but on the other, you’re indirectly allowing your work to have access to your personal data. Just how do you keep those separate and keep your privacy intact? This bring-your-own-device (BYOD) trend is not only tricky for employees like you; companies also face challenges in adopting BYOD.
Gartner predicts that 50% of employers will embrace BYOD by 2017. These employers believe that BYOD enhances employee productivity. What they may not be fully aware of are the risks that come with this measure. About 2 in 5 large data breaches are caused by lost or stolen employee devices, and roughly 3 in 10 employees with company data stored on unsanctioned Web services are responsible for security breaches.
To maximize the benefits of BYOD without increasing the risks, companies and their employees need to strike a balance between maintaining employee privacy and having control over corporate data on devices. Employers, for example, can set clear guidelines or BYOD policies that employees need to follow to avoid corporate data from spilling out. Employees, on the other hand, need to abide by these rules but make sure that their own data is safe from prying eyes.
More is discussed in Split Screen, an interactive infographic detailing the steps companies can take to protect their data and that of their employees.
Like it? Add this infographic to your site:
1. Click on the box below. 2. Press Ctrl+A to select all. 3. Press Ctrl+C to copy. 4. Paste the code into your page (Ctrl+V).
Image will appear the same size as you see above.
Posted in Mobile Safety, Infographics, BYOD, Consumerization
- Ransomware Spotlight: TargetCompany
- Email Threat Landscape Report: Cybercriminal Tactics, Techniques That Organizations Need to Know
- Preventing an Imminent Ransomware Attack With Early Detection and Investigation
- Inside the Halls of a Cybercrime Business
- Securing Cloud-Native Environments with Zero Trust: Real-World Attack Cases