However, many have already embraced BYOD, with one in five of IT managers surveyed confident that personal devices did not pose a threat to their company and actively encouraged employees to sign up to the company’s BYOD policy. An IT security business is a great solution to network security and is a primary reason why IT managers are allowing personal devices to be used.
The survey by IT Solutions provider, Equanet, found that nearly 90 per cent stated they were unable to ensure that personally owned devices adhere to their company’s security standard. For most businesses, security checks are not mandatory, and 92 per cent of IT managers do not request that employees regularly change the passwords of their personally owned devices, even when used for work purposes and to carry company data such as emails and documents.
With 89 per cent of UK businesses currently allowing employees to connect personal devices to their company’s network or system, Equanet recommends that BYOD policies need to incorporate security procedures as well.
Charles Barratt, new solutions development manager at Equanet, comments, “A fully realised BYOD policy is beneficial for IT budgets, productivity and employee morale, however clear policies and strategies need to be in place to overcome any possible security issues. There are many different options and types of BYOD schemes, and we are seeing a real interest from customers to introduce them. Our role has been to provide the options, along with practical ways of implementing and financing such schemes and making sure they are risk-free.”
Currently, 10 per cent of IT managers refuse to let personal devices connect to their networks. However, many have already embraced BYOD, with one in five of IT managers surveyed confident that personal devices did not pose a threat to their company and actively encouraged employees to sign up to the company’s BYOD policy.
Charles Barratt concluded by saying, “Confidential, work-related information increasingly passes from work computer to personal device. This trend can enhance the productivity of employees but needs to be managed. As soon as a device connects to a business’s system, it should be subject to the same security safeguards as company equipment. A fully integrated BYOD scheme and policy is vital.”