{"id":1541,"date":"2012-07-17T17:45:02","date_gmt":"2012-07-18T00:45:02","guid":{"rendered":"https:\/\/blogs.poly.com\/?p=156"},"modified":"2012-07-17T17:45:02","modified_gmt":"2012-07-18T00:45:02","slug":"why-controlling-byod-is-essential-in-the-corporate-world","status":"publish","type":"post","link":"https:\/\/blogs.poly.com\/why-controlling-byod-is-essential-in-the-corporate-world\/","title":{"rendered":"Why Controlling BYOD is Essential in the Corporate World"},"content":{"rendered":"

In a white paper<\/a> released by Tangoe, Inc. \u201cBring Your Own Device\u201d or more simply known as BYOD, has been shown to be more of a threat to corporate security than once thought.\u00a0 Some organizations allow their users to use devices freely on their corporate network, others require security measures to be taken prior to use, and some don\u2019t allow it at all.\u00a0 Many corporations haven\u2019t taken measures to protect their networks from users as they simply don\u2019t see it as that great of a threat, but that is soon to change.<\/p>\n

The white paper released by Tangoe states that \u201c50 percent of businesses in the U.S. and EMEA allow BYOD access to secure corporate networks, while 23 percent of BYOD workers claim their device is not an IT approved device.\u201d\u00a0 These rogue devices can easily breach a hole in security, and many times, all it takes is one device to cause a lot of damage.\u00a0 What if it\u2019s not just one device though?\u00a0 According to PriceWaterhouseCooper\u2019s global survey of CIO\u2019s in 2011, 28% of their workforce used personal devices for work-related tasks and that this number was expected to grow to 35% within two years.\u00a0 We already have seen that many of these devices are probably not IT approved ones either.\u00a0 PwC also found in their 2012 Global Information Security Survey, that only 43% of enterprises have even developed a strategy for user-owned devices like smartphones and tablets.\u00a0 That means the majority of organizations have yet to even put security policies or procedures in place for employee-owned devices being used on their network.\u00a0 As employees are doing more and more work from personal devices, this is an issue that must be addressed.<\/p>\n

The white paper states \u201cDespite news headlines to the contrary, the largest risk to your organization, is not a hacker or malware, but a well-intentioned employee with an unmanaged personal device\u201d.\u00a0 So what can we do to help protect ourselves from this growing threat, while still allowing the freedom that BYOD allows?\u00a0 Here are some tips:<\/p>\n