Consumer devices: The sting in the tail

Are the advantages of BYOD outweighed by the risks? Perhaps not, but CIOs need to plan for a more fluid line between work and personal life

Inside the enterprise: Much has been written, here and elsewhere about the rise of the consumer device in the enterprise. But hard data on how we use personal devices at work is still rather hard to come by.

Samsung, though, has attempted to quantify at least some of the effects of the use of both personal devices, and consumer-focused apps, at work.

The survey of 4,500 workers across Europe suggested that three quarters of people do work in their personal time, and take care of personal tasks at work. That might not be much of a surprise, given the hours many Europeans spend in the office.

But the Samsung study also found that on average, office workers have 10 personal apps on work smartphones. As many as 41 per cent of workers use a personal smartphone for work.

More worryingly at least for IT managers is the finding that 26 per cent of workers use personal technology to work round restrictions on the apps, services, or websites they can access using business-issued technology. Younger workers are the most likely to try to circumvent company rules.

That compliance with, or even awareness of, security and data protection rules is low will, again, surprise few CIOs or IT security teams.

According to the research, 11 per cent of European workers didn't know whether or not there was a company policy on using personal devices for work and used their devices regardless.

Younger workers are the most likely to try to circumvent company rules.

Some 44 per cent of companies did, though, have either a formal or an informal BYOD policy. Unfortunately for compliance, 18 per cent of European workers knew about policies, but also continued to use their own devices.

Compliance with security policies rather than more general rules on BYOD was rather more positive: 45 per cent of workers said they were aware of policies, and tried to keep to them. Another 15 per cent knew of a policy but confessed to not knowing its content. Another 12 per cent ignored the policy.

This suggests that companies have more to do, both to raise awareness of their policies, and to ensure compliance. Physical and software security measures do have their place. But if bright and well-meaning employees circumvent them in order to do their jobs, IT will always be on the back foot.

Instead, the focus needs to be on user education not just around the policies and rules, but explaining why those policies and rules are necessary. Samsung did find that security awareness has increased over the last year, and almost all companies said they had strengthened security measures too.

But to be effective, security has to be user-friendly as well as technically robust. In that area at least, it seems there is work still to be done.

Stephen Pritchard is a contributing editor at IT Pro.

Featured Resources

2021 Thales access management index: Global edition

The challenges of trusted access in a cloud-first world

Free download

Transforming higher education for the digital era

The future is yours

Free download

Building a cloud-native, hybrid-multi cloud infrastructure

Get ready for hybrid-multi cloud databases, AI, and machine learning workloads

Free download

The next biggest shopping destination is the cloud

Know why retail businesses must move to the cloud

Free Download

Recommended

Samsung 870 QVO review: Cheap and speedy
solid state storage (SSD)

Samsung 870 QVO review: Cheap and speedy

13 Oct 2021
Samsung's new 14nm EUV DDR5 DRAM in mass production
Hardware

Samsung's new 14nm EUV DDR5 DRAM in mass production

12 Oct 2021
Samsung unveils open source software for CXL Memory platform
Hardware

Samsung unveils open source software for CXL Memory platform

7 Oct 2021
Podcast transcript: Are foldable phones more than a fad?
Mobile

Podcast transcript: Are foldable phones more than a fad?

17 Sep 2021

Most Popular

HPE wins networking contract with Birmingham 2022 Commonwealth Games
Network & Internet

HPE wins networking contract with Birmingham 2022 Commonwealth Games

15 Oct 2021
Veritas Backup Exec 21.3 review: Covers every angle
backup software

Veritas Backup Exec 21.3 review: Covers every angle

14 Oct 2021
What is cyber warfare?
Security

What is cyber warfare?

15 Oct 2021