Bring your own device (BYOD) to work is becoming increasingly popular among businesses. So, what are the risks? Are the benefits worth making your network vulnerable? That’s what we’re going to dig into with this short blog series. This is the second of four articles on BYOD.
Pros and Cons of BYOD
There are obviously a lot of threats with allowing anything new into your network, especially if it’s also used for personal use. But, it’s not all bad with BYOD! Check out the Pros and Cons of allowing your employees to bring their own device to work!
- BYOD lowers your investment in hardware. If employees are willing to purchase their own devices, that can only be good for the business right?! You spend less money purchasing hardware if they already have the tools to do their job.
- Employees are more efficient with up-to-date equipment. If a new device allows your employees to complete the same task in half the time, they can service more customers with fewer resources.
- Employees are more likely to work outside of the office. Responsiveness is increased when employees have the means to communicate outside of the office. BYOD means that the employee has the device and is most likely using it for personal use as well. This means they are more available outside of the office to answer emails and complete other tasks.
- Employees are more capable of working remotely. When employees work remotely, your overhead is lowered and your employees are happier.
- BYOD implementation can be safe with proper infrastructure and planning. If you’re using a SonicWALL Firewall with secure wireless zones that are separate from the local network, you can restrict access to certain devices. For example, you can restrict access to email only or you can enable total access to the entire network.
- If you have a traditional wireless access point with security enabled, it’s not secure enough. There’s no protection on the traffic that’s flowing to and from the devices so how do you know your access is secure? You don’t have control of the level of security.
- Once a virus is allowed in, it’s in. If the device that you’re attaching to the network has a virus and you connect it to the network, there’s no way of stopping it from getting in. Then, it’s all about damage control.
- Can’t restrict access to certain areas of the network. With traditional secure access points, you can’t tell the devices that they can have access to the network but not access to a certain part of the network. It’s all or nothing!
- everything personal becomes public. You can’t hide things on your personal device from the network. Just like you can’t restrict access to certain things on the network when you connect at work, the network then has access to all of your personal files from your device.
There are two sides to everything. You just have to be cautious. Don’t assume that everything’s secure. Weigh the pros and cons for your business and then decide what amount of risk you are comfortable assuming as a company.