Challenge #1: Device compatibility issues
If you give employees the option to choose the devices they use, youâll end up with different operating systems throughout the companyâin the IT survey, organizations that had implemented BYOD programs have, on average, 42% Windows users, 33% Mac users, and 25% Linux users.
With various operating systems in play, companies might run into an issue of commonly used software not being compatible across devices, creating versioning issues and making it more difficult for employees to collaborate.
Solution
First, businesses can curtail many of the challenges by establishing a CYOD policy over a BYOD policy. If IT departments ask employees to select their devices from a pre-approved list, IT will know which operating systems they need to accommodate when they choose software.
Companies can implement workarounds for employees who need to use software that isnât offered on the right operating systemâbut it will cost them. For example, many users install virtualization programs to use Windows programs while theyâre running their Mac OS, and leading software, such as Parallels Desktop and VMWare Fusion, starts at $79.99 per year. After that, the user would still need to pay for and install the other operating system, such as Windows 10 Pro, which costs $199.99 per user.
Cloud-based software like Lucidchart can more easily help solve the device compatibility issue. With applications such as G Suite, Microsoft Office 365, Salesforce, Box, Slack, Confluence, Jira, and Lucidchart's integrations with all of these popular apps, employees can access the information they need from a centralized location from any operating system. And because employees are working off one single source of truth, rather than sending different versions back and forth, they know that they have the most up-to-date information and can collaborate more easily.
Challenge #2: Increased IT support
Some concerns that the Lucidchart IT survey uncoveredâsuch as staying on top of different software updates and training staff on multiple systemsâboil down to one BYOD challenge: organizations will need more IT support in order to handle multiple operating systems and devices.
Supporting this claim, when the HDI Support Center Practices & Salary Survey reported a 57% increase in trouble tickets, 26% of IT professionals attributed the increase to âuse of personal equipment/devicesâ and another 23% to âsupporting mobile devices.â
Solution
Companies who are concerned about their IT departments supporting too many devices should consider these solutions:
- Switch to a CYOD policy that limits employees to a few approved devices.
- Establish policies around the types of situations that IT will handle (e.g., employees need to call their providers about billing, but IT can help employees connect to the company network).
- Look for devices and software that provide extensive support materials or even personalized training for the company.
However, in some cases, an increased number of support tickets may not be a concern (the time IT will spend setting up adequate security is a different story). Letâs take a look at IBM, a company that should know a thing or two about technology.
At the 2015 Jamf Nation User Conference, Fletcher Previn, now the CIO at IBM, explained how, earlier that year, the company offered employees the choice to switch from a PC to a Mac when it was time to upgrade their hardware. 73% of employees took the Mac.
With this change, IBM experienced up to $535 savings per Mac, largely due to the fact that Macs require less IT support. Because Apple produces higher-quality OS software, the IT department didnât need to go from employee to employee performing updates as often. IBM also noted that only 5% of employees required Help Desk assistance as opposed to 40% of PC users. After Previn revealed IBMâs Mac choice program, many large enterprises, including SAP, Capital One, and Walmart, followed suit.
The takeaway? By letting employees use the devices they are most familiar with, organizations can encourage self-sufficiency and reduce IT support costs.
Challenge #3: Privacy and security risks
Although a desire to reduce security risks is a top driver for moving to BYOD and CYOD to begin with, such device policies present security risks of their own. In the BYOD and Mobile Security Report from Tenable, security concerns (39%) and employee privacy concerns (12%) inhibit BYODÂ program adoption the most.
BYOD security risks may stem from the loss of control and visibility into personal devices. This may leave companies more susceptible to security threats, such as:
- Data leakage or loss
- Unauthorized access to company data and systems
- Increased exposure to malware
- Usersâ ability to download unsafe applications or content
- Theft or loss of devices
- Threats to compliance requirements
- Employees leaving the company with insider knowledge
Not only do employees put sensitive company data at risk when they use their personal devices, but they also unwittingly expose their personal data because they donât fully understand privacy risks. Security Magazine reports that 77% of employees say they havenât been trained about the risks of using their devices at work.
Solution
Again, many companies have opted for a CYOD policy to give the organization more control over devices. Albert Lewis, CISSP, principal examiner for the Federal Housing Finance Agency, told Security Magazine, âWhen you buy devices in bulk, thatâs a huge savings, plus you get to deploy and manage the devices the way you want to. That central management becomes a big part of the CYOD approach.â
IT organizations implementing both BYOD and CYOD programs, however, should develop BYOD security best practices and processes with security controls before implementing. Some of the top measures for controlling security risks to have in place for mobile devices, many of which apply to other types of company-purchased hardware, include:
- Password protection (63%)
- Remote wipe for unexpected employee departure, lost/stolen devices, or hacked devices (49%)
- Device encryption (43%)
- Data removal or device disposal for employees leaving the company (38%)
Additional BYOD security policies might involve:
- Blocking IPs outside the company (IT may need to set up VPNs for remote workers at an additional cost)
- Requiring two-factor authentication
- Using cloud-based software with document control and data encryption
- Using identity management software, such as Okta or OneLogin, to set up single sign-on and allow admins to easily provision/de-provision employees with software
- Establishing clear exit processes, such as wiping or repossessing devices
Companies should absolutely implement the best security practices for a BYOD or CYOD adoption, but they should also plan for the associated costs. In Security Magazine, Kristi Horton, senior cyber security risk analyst at Gate 15, stated about BYOD policies, âWhen youâre considering the cost, consider how much itâs going to cost you to implement the security controls necessary to comply with best practices for security.â
Implementing BYOD or CYOD in your organization
Although BYOD and CYOD policies present several challenges, there are enough benefits, including increased mobility and productivity, to make these device policies worth your consideration. But perhaps the most compelling reason to implement these BYOD policies is that your employees are likely to use their chosen devices either way.
The workplace will continue to change, especially as new technologies emerge. By embracing these changes rather than working around them, companies can decrease costs and security risksâand pick up some fringe benefits along the way.