Consumer devices: The sting in the tail

Are the advantages of BYOD outweighed by the risks? Perhaps not, but CIOs need to plan for a more fluid line between work and personal life

Inside the enterprise: Much has been written, here and elsewhere about the rise of the consumer device in the enterprise. But hard data on how we use personal devices at work is still rather hard to come by.

Samsung, though, has attempted to quantify at least some of the effects of the use of both personal devices, and consumer-focused apps, at work.

The survey of 4,500 workers across Europe suggested that three quarters of people do work in their personal time, and take care of personal tasks at work. That might not be much of a surprise, given the hours many Europeans spend in the office.

But the Samsung study also found that on average, office workers have 10 personal apps on work smartphones. As many as 41 per cent of workers use a personal smartphone for work.

More worryingly at least for IT managers is the finding that 26 per cent of workers use personal technology to work round restrictions on the apps, services, or websites they can access using business-issued technology. Younger workers are the most likely to try to circumvent company rules.

That compliance with, or even awareness of, security and data protection rules is low will, again, surprise few CIOs or IT security teams.

According to the research, 11 per cent of European workers didn't know whether or not there was a company policy on using personal devices for work and used their devices regardless.

Younger workers are the most likely to try to circumvent company rules.

Some 44 per cent of companies did, though, have either a formal or an informal BYOD policy. Unfortunately for compliance, 18 per cent of European workers knew about policies, but also continued to use their own devices.

Compliance with security policies rather than more general rules on BYOD was rather more positive: 45 per cent of workers said they were aware of policies, and tried to keep to them. Another 15 per cent knew of a policy but confessed to not knowing its content. Another 12 per cent ignored the policy.

This suggests that companies have more to do, both to raise awareness of their policies, and to ensure compliance. Physical and software security measures do have their place. But if bright and well-meaning employees circumvent them in order to do their jobs, IT will always be on the back foot.

Instead, the focus needs to be on user education not just around the policies and rules, but explaining why those policies and rules are necessary. Samsung did find that security awareness has increased over the last year, and almost all companies said they had strengthened security measures too.

But to be effective, security has to be user-friendly as well as technically robust. In that area at least, it seems there is work still to be done.

Stephen Pritchard is a contributing editor at IT Pro.

Featured Resources

Unleashing the power of AI initiatives with the right infrastructure

What key infrastructure requirements are needed to implement AI effectively?

Download now

Achieve today. Plan tomorrow. Making the hybrid multi-cloud journey

A Veritas webinar on implementing a hybrid multi-cloud strategy

Download now

A buyer’s guide for cloud-based phone solutions

Finding the right phone system for your modern business

Download now

The workers' experience report

How technology can spark motivation, enhance productivity and strengthen security

Download now

Recommended

Samsung Galaxy Note 20 Ultra 5G review: Exquisitely crafted
Mobile Phones

Samsung Galaxy Note 20 Ultra 5G review: Exquisitely crafted

18 Jan 2021
Samsung Galaxy S21 first look: Contour of the Galaxy
Mobile Phones

Samsung Galaxy S21 first look: Contour of the Galaxy

14 Jan 2021
Samsung Galaxy S21 Ultra first look: Big has never looked so beautiful
Mobile Phones

Samsung Galaxy S21 Ultra first look: Big has never looked so beautiful

14 Jan 2021
Samsung LC34J791 review: A very tempting screen
monitors

Samsung LC34J791 review: A very tempting screen

14 Dec 2020

Most Popular

How to move Windows 10 from your old hard drive to SSD
operating systems

How to move Windows 10 from your old hard drive to SSD

21 Jan 2021
Hackers are actively exploiting three Apple iOS flaws
exploits

Hackers are actively exploiting three Apple iOS flaws

27 Jan 2021
16 ways to speed up your laptop
Laptops

16 ways to speed up your laptop

26 Jan 2021