• For Buyers
    • Retail News
    • Products & Suppliers
    • Ecommerce
    • Marketing & Management
    • Trade Show News
  • For Suppliers
    • Supplier News
    • Marketing & Management
    • Importing
    • Manufacturers
    • Warehousing
    • Finance
    • Show Exhibiting
  • Wholesale 101
  • Trade Show Calendar
  • Wholesale Products
  • New Suppliers
Facebook Twitter Instagram
Saturday, March 25
  • Subscribe
  • Submit Content
  • About Us
    • Contact Us
  • Advertise
    • Display Advertising
    • Email Marketing Campaigns
    • Newsletter Advertising
    • Sponsored Content
    • Lead Generation Services
  • Top Product Sources
Facebook Twitter Instagram
WholesaleCentral.com Blog
  • For Buyers
    • Retail News
    • Products & Suppliers
    • Ecommerce
    • Marketing & Management
    • Trade Show News
  • For Suppliers
    • Supplier News
    • Marketing & Management
    • Importing
    • Manufacturers
    • Warehousing
    • Finance
    • Show Exhibiting
  • Wholesale 101
  • Trade Show Calendar
  • Wholesale Products
  • New Suppliers
WholesaleCentral.com Blog
Home»For Buyers»Marketing & Management»BYOD Risk
Marketing & Management

BYOD Risk

PublisherBy PublisherSeptember 1, 20123 Mins Read
Facebook Twitter Email
Share
Facebook Twitter Email

image of bring your own device byodBring Your Own Device (BYOD), the new trend where employees are using personal mobile devices to access business networks such as file servers, databases and email, is an attractive concept to some independent retailers. Many organizations believe mobile computing increases the efficiency and effectiveness of their workforces, and they like the idea of saving money on the purchase of technology.  According to a recent Cisco study, 95 percent of respondents’ organizations permit employee-owned devices in the workplace, and 76 percent of respondents categorized BYOD as somewhat or extremely positive for their companies. Cisco says it expects the average number of connected devices per worker to reach 3.3 by 2014, up from an average of 2.8 in 2012.

While BYOD appears to be here to stay, it presents huge challenges, starting with device compatibility. There are many operating systems in the land of smartphones, such as iOS, Android, Windows, Blackberry, and Ubuntu Linux. Employees’ personal devices may or may not be compatible with a business’s devices, or the devices of fellow employees. More importantly, BYOD increases the risk of security breaches, and the risk grows with each new device granted network access. An employee can unleash malicious code while checking email from an unpatched iPad, or can compromise a company’s private data by leaving a phone in the wrong place at the wrong time. If an employee uses a smartphone to access privileged company information, the data stored on the phone could potentially be retrieved by another person. User awareness is a key element of mobile device security. Therefore, it is a good practice to provide security awareness training to employees who use their mobile devices for work.

In addition, security and compliance may boil down to controlling the data, not the device. One of the more popular strategies for managing BYOD is Mobile Application Management (MAM). MAM focuses enterprise resources on managing data by taking charge of the apps that can access that data, while leaving employees in control of the devices they own. MAM allows organizations to mandate encryption, set and enforce role-based policies for applications including how they store and share documents, and even remove data and suspend apps when an employee leaves the company or loses a device. In other words, business owners can ensure that sensitive data never leaves their customer relationship management app without limiting how employees use their devices on their own time.

Allowing employees to use personal mobile devices to access business networks can increase productivity, but it can also make a business vulnerable in the areas of security and privacy. Independent retailers should carefully consider the pros and cons of BYOD, and formulate and implement a clear plan to reduce the risks, before allowing employees to access privileged data on their mobile devices.

management mobile security smart phones
Share. Facebook Twitter Email
Previous ArticleCutting Red Tape
Next Article Summit Hats Still Peaking

Related Posts

Make Money with Foreign-Trade Zones

February 22, 2023

Technology to Prepare Your Store for the Future

January 19, 2023

2023 Retail Success Guide

January 5, 2023
Sign Up for Buyer Updates
WholesaleCentral.com

Join the Buyer's Network

Get news & updates only for retailers.

Latest Posts

Amazon Return Pallets For Sale: How to Profit

March 20, 2023

2023 Wholesale Apparel Trends

March 14, 2023

Top Wholesale Easter Products

February 27, 2023

The Future of Sustainable Manufacturing is a Hybrid Approach

February 23, 2023

Make Money with Foreign-Trade Zones

February 22, 2023

Overstock Liquidations

January 25, 2023
how-to
Wholesale 101 for Buyers

Amazon Return Pallets For Sale: How to Profit

March 20, 202311 Mins Read

A big trend among some online sellers is buying Amazon return pallets and overstock and…

Product News

Overstock Liquidations

January 25, 20236 Mins Read

Overstock inventory refers to the excess goods or merchandise that a retailer has on hand…

Retail News

5 Essential Tax Season Preparation Tips

January 24, 202310 Mins Read

Are you ready for tax season? April 18 is approaching quickly, and many day-to-day decisions…

Wholesale 101 for Buyers

How to Create a Google Business Profile

January 18, 20236 Mins Read

Looking for new ways to get your brand noticed? Creating a Google Business Profile can…

  • About Us
  • Subscribe
  • Contact Us
  • Advertise
  • Find Wholesale Sources
WholesaleCentral.com

Join the Buyer's Network

Get news & updates only for retailers.

Follow Us:

Copyright © 2023. Sumner Communications, Inc..

Type above and press Enter to search. Press Esc to cancel.