Many staff often want to use their own laptops, smartphones and tablets to carry out their business functions. One clear advantage is that the user will be familiar with the device and will be saved the trouble of carrying both work and personal devices. It can also minimise overheads for the business relating to procurement and provisioning.442.
However, organisations should still apply proportionate security controls and monitoring to these devices if they are to be adequately secured.
Balancing your organisation’s need to protect its data and systems against the expectations of the device owner can be difficult. Without careful consideration, you will either end up with your users rejecting BYOD, or finding other ways to do their job using ‘shadow IT.’