{"id":58866,"date":"2014-05-22T18:47:36","date_gmt":"2014-05-22T22:47:36","guid":{"rendered":"http:\/\/rbach.net\/blog\/index.php\/"},"modified":"2021-07-02T14:56:19","modified_gmt":"2021-07-02T18:56:19","slug":"byod-my-phone-your-problem","status":"publish","type":"post","link":"https:\/\/rbach.net\/index.php\/byod-my-phone-your-problem\/","title":{"rendered":"BYOD: My Phone Your Problem"},"content":{"rendered":"<div class=\"maincolumn\">\n<p style=\"text-align: left;\"><a href=\"https:\/\/www.canr.msu.edu\/news\/stress_and_teens\" target=\"_blank\" rel=\"noopener noreferrer\"><img data-recalc-dims=\"1\" loading=\"lazy\" decoding=\"async\" class=\"alignleft wp-image-100647 \" title=\"BYOD: My Phone Your Problem\" src=\"https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/hiding-face.jpg?resize=90%2C90&#038;ssl=1\" alt=\"BYOD: My Phone Your Problem\" width=\"90\" height=\"90\" srcset=\"https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/hiding-face.jpg?resize=150%2C150&amp;ssl=1 150w, https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/hiding-face.jpg?resize=75%2C75&amp;ssl=1 75w, https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/hiding-face.jpg?w=200&amp;ssl=1 200w\" sizes=\"auto, (max-width: 90px) 100vw, 90px\" \/><\/a>Fujitsu warns that <strong>BYOD<\/strong> programs have a lot of <strong><a title=\"Opportunity cost\" href=\"http:\/\/en.wikipedia.org\/wiki\/Opportunity_cost\" target=\"_blank\" rel=\"wikipedia noopener noreferrer\">hidden costs<\/a><\/strong> that <strong>IT departments often do not consider<\/strong> according to a recent <a title=\"BYOD is going to cost you, experts warn\" href=\"https:\/\/web.archive.org\/web\/20160319195234\/http:\/\/www.fiercemobileit.com\/story\/byod-going-cost-you-experts-warn\/2013-07-10\" target=\"_blank\" rel=\"noopener noreferrer\">article<\/a> on <a title=\"FierceMobileIT\" href=\"https:\/\/web.archive.org\/web\/20160608213226\/http:\/\/www.fiercemobileit.com:80\/\" target=\"_blank\" rel=\"noopener noreferrer\"><em>FierceMobileIT<\/em><\/a>. <a title=\"Craig Merrick\" href=\"www.linkedin.com\/pub\/dir\/Craig\/Merrick\" target=\"_blank\" rel=\"noopener noreferrer\">Craig Merrick<\/a>, the managing consultant for mobile business solutions at <a href=\"http:\/\/www.fujitsu.com\/us\/\" target=\"_blank\" rel=\"noopener noreferrer\">Fujitsu<\/a> (<a title=\"TYO: JP:6702\" href=\"http:\/\/www.marketwatch.com\/investing\/stock\/6702?countrycode=jp\" target=\"_blank\" rel=\"noopener noreferrer\">6702<\/a>), <a title=\"BYOD support: a difficult call\" href=\"http:\/\/www.totaltele.com\/view.aspx?ID=482183\" target=\"_blank\" rel=\"noopener noreferrer\">explains<\/a> the <strong>sources of extra costs of the BYOD program<\/strong>.<\/p>\n<p style=\"text-align: left;\"><a href=\"https:\/\/web.archive.org\/web\/20170927215323\/http:\/\/vpnhaus.ncp-e.com\/2012\/10\/10\/byod-dominates-interop-new-york\/\" target=\"_blank\" rel=\"noopener noreferrer\"><img data-recalc-dims=\"1\" loading=\"lazy\" decoding=\"async\" class=\"alignright wp-image-100649 \" title=\"oftware updates to smartphones could cause problems\" src=\"https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/byod_free_lunch.jpeg?resize=79%2C90&#038;ssl=1\" alt=\"oftware updates to smartphones could cause problems\" width=\"79\" height=\"90\" srcset=\"https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/byod_free_lunch.jpeg?resize=133%2C150&amp;ssl=1 133w, https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/byod_free_lunch.jpeg?resize=67%2C75&amp;ssl=1 67w, https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/byod_free_lunch.jpeg?w=290&amp;ssl=1 290w\" sizes=\"auto, (max-width: 79px) 100vw, 79px\" \/><\/a>The enterprise can incur significant additional costs if it tries to <strong>support all versions of operating systems<\/strong> being used by BYOD employees. Mr. Merrick says software updates to smartphones could cause problems with existing corporate applications. This could lead to the <strong>help desk being overwhelmed<\/strong> with calls.<\/p>\n<h3>BYOD support costs<\/h3>\n<p style=\"text-align: left;\">He cites a recent survey of 25,000 BYOD end users by Fujitsu found that 80% of <span style=\"text-decoration: underline;\"><strong>users believe that their corporate IT department is responsible for fixing issues with their personal devices.<\/strong><\/span> &#8220;<em>They want to bring their own device but they don&#8217;t want to take responsibility for fixing it<\/em>,&#8221; Fujitsu&#8217;s Merrick said.\u00a0<a title=\"Gartner\" href=\"https:\/\/www.gartner.com\/technology\/home.jsp\" target=\"_blank\" rel=\"noopener noreferrer\">Gartner<\/a> (<a title=\"NYSE : IT\" href=\"https:\/\/www.nyse.com\/quote\/XNYS:IT\" target=\"_blank\" rel=\"noopener noreferrer\">IT<\/a>) forecasts that <a title=\"Per-employee cost of BYOD will triple by 2016, predicts Gartner\" href=\"https:\/\/web.archive.org\/web\/20160506061525\/http:\/\/www.fiercemobileit.com\/story\/employee-cost-byod-will-triple-2016-predicts-gartner\/2013-05-05\" target=\"_blank\" rel=\"noopener noreferrer\">supporting BYOD will cost enterprises <strong>$300 per employee annually<\/strong> by 2016<\/a>, up from a current $100 per employee annually.<\/p>\n<p style=\"text-align: left;\"><a href=\"https:\/\/web.archive.org\/web\/20141021000145\/http:\/\/www.securedgenetworks.com:80\/secure-edge-networks-blog\/bid\/87987\/10-Surprising-BYOD-Stats-You-Need-to-See\" target=\"_blank\" rel=\"noopener noreferrer\"><img data-recalc-dims=\"1\" loading=\"lazy\" decoding=\"async\" class=\"alignright wp-image-100651 \" title=\"storing corporate information on personal devices\" src=\"https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/BYOD_devices.jpg?resize=138%2C89&#038;ssl=1\" alt=\"storing corporate information on personal devices\" width=\"138\" height=\"89\" srcset=\"https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/BYOD_devices.jpg?resize=150%2C96&amp;ssl=1 150w, https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/BYOD_devices.jpg?resize=75%2C48&amp;ssl=1 75w, https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/BYOD_devices.jpg?w=640&amp;ssl=1 640w\" sizes=\"auto, (max-width: 138px) 100vw, 138px\" \/><\/a>Another area of unforeseen cost, according to the article is a <strong>security breach<\/strong> caused by BYOD. A <a title=\"THE IMPACT OF MOBILE DEVICES ON INFORMATION SECURITY: A SURVEY OF IT PROFESSIONALS\" href=\"https:\/\/www.checkpoint.com\/downloads\/products\/check-point-mobile-security-survey-report2013.pdf\" target=\"_blank\" rel=\"noopener noreferrer\">survey<\/a> (PDF) of 790 <a title=\"Information technology\" href=\"http:\/\/en.wikipedia.org\/wiki\/Information_technology\" target=\"_blank\" rel=\"wikipedia noopener noreferrer\">IT professionals<\/a> by <a title=\"Dimensional Research\" href=\"http:\/\/www.dimensionalresearch.com\/\" target=\"_blank\" rel=\"noopener noreferrer\">Dimensional Research<\/a> on behalf of security firm <a title=\"Check Point\" href=\"https:\/\/www.checkpoint.com\/\" target=\"_blank\" rel=\"noopener noreferrer\">Check Point<\/a> found that <strong>79% of respondents reported they had a <a title=\"Mobile security\" href=\"http:\/\/en.wikipedia.org\/wiki\/Mobile_security\" target=\"_blank\" rel=\"wikipedia noopener noreferrer\">mobile security<\/a> incident<\/strong> within the past year. Many of these incidents stemmed from employees storing corporate information on personal devices.<\/p>\n<h3>Mobile security incidents<\/h3>\n<p style=\"text-align: left;\">The report revealed that more than half of large businesses reported mobile security incidents that have cost them <strong>more than $500,000<\/strong>. For 45% of SMB, mobile security incidents exceeded $100,000 in the past year, the survey found. Tomer Teller, security evangelist and researcher at Check Point <a title=\"Check Point Survey Reveals 79 Percent of Businesses Experienced a Mobile Security Incident in the Past Year\" href=\"https:\/\/web.archive.org\/web\/20160506082315\/http:\/\/www.fiercemobileit.com\/press-releases\/check-point-survey-reveals-79-percent-businesses-experienced-mobile-securit\" target=\"_blank\" rel=\"noopener noreferrer\">commented<\/a>;<\/p>\n<p style=\"padding-left: 30px; text-align: justify;\"><em>Without question, the explosion of BYOD, mobile apps, and cloud services has created a herculean task to protect corporate information for businesses both large and small.<\/em><\/p>\n<p><img data-recalc-dims=\"1\" loading=\"lazy\" decoding=\"async\" class=\"alignright wp-image-100653 \" title=\"protect corporate information for businesses\" src=\"https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/byod_dog-e1566076838279-150x116.jpg?resize=125%2C97&#038;ssl=1\" alt=\"protect corporate information for businesses\" width=\"125\" height=\"97\" srcset=\"https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/byod_dog-e1566076838279.jpg?resize=150%2C116&amp;ssl=1 150w, https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/byod_dog-e1566076838279.jpg?resize=75%2C58&amp;ssl=1 75w, https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/byod_dog-e1566076838279.jpg?w=455&amp;ssl=1 455w\" sizes=\"auto, (max-width: 125px) 100vw, 125px\" \/>The article concludes that additional costs for firms contemplating BYOD, can include <strong>network infrastructure upgrade, wireless service costs, device management product investment, and application and software investments<\/strong>, <a title=\"Key Steps To Capture The Value Of BYOD Programs\" href=\"http:\/\/blogs.forrester.com\/michele_pelino\/13-05-02-key_steps_to_capture_the_value_of_byod_programs\" target=\"_blank\" rel=\"noopener noreferrer\">explained<\/a> <a title=\"Forrester\" href=\"https:\/\/www.forrester.com\/\" target=\"_blank\" rel=\"noopener noreferrer\">Forrester<\/a> (<a title=\"NASDAQ\" href=\"https:\/\/www.tradingview.com\/symbols\/NASDAQ-FORR\/\" target=\"_blank\" rel=\"noopener noreferrer\">FORR<\/a>) analyst <a title=\"Forrester analyst Michele Pelino\" href=\"https:\/\/web.archive.org\/web\/20201028182721\/https:\/\/www.forrester.com\/michele-pelino\" target=\"_blank\" rel=\"noopener noreferrer\">Michele Pelino<\/a>.<\/p>\n<p><strong><em>rb-<\/em><\/strong><\/p>\n<p><em>Many businesses believe that implementing a BYOD policy will save them both the capital outlay of acquiring devices and the ongoing cost of maintaining them. But the reality does not always match the theory.\u00a0 Planning and implementing a successful BYOD program requires executives to understand the costs, as well as the benefits.<\/em><\/p>\n<h6>Related articles<\/h6>\n<ul>\n<li><a href=\"https:\/\/news.softpedia.com\/news\/A-Quarter-of-US-Business-Users-Experienced-a-Security-Issue-on-Their-Private-Devices-in-2013-442411.shtml\" target=\"_blank\" rel=\"noopener noreferrer\">A Quarter of US Business Users Experienced a Security Issue on Their Private Devices in 2013<\/a> (news.softpedia.com)<\/li>\n<\/ul>\n<p>&nbsp;<\/p>\n<p style=\"text-align: left;\"><em><a title=\"Ralph Bach\" href=\"https:\/\/rbach.net\/index.php\/new-resume\/\" target=\"_blank\" rel=\"noopener noreferrer\">Ralph Bach<\/a>\u00a0has been in IT long enough to know better and has blogged from his\u00a0<a title=\"Bach Seat\" href=\"https:\/\/rbach.net\/\" target=\"_blank\" rel=\"noopener noreferrer\">Bach Seat<\/a> about IT, careers, and anything else that catches his attention since 2005. You can follow him on <a class=\"broken_link\" href=\"http:\/\/www.linkedin.com\/in\/rb48334\" target=\"_blank\" rel=\"noopener noreferrer nofollow\">LinkedIn<\/a>,\u00a0<a href=\"https:\/\/www.facebook.com\/ralph.bach.14\" target=\"_blank\" rel=\"noopener noreferrer\">Facebook<\/a>,\u00a0and\u00a0<a href=\"https:\/\/twitter.com\/rbach48334\" target=\"_blank\" rel=\"noopener noreferrer\">Twitter<\/a>. Email the Bach Seat\u00a0<a href=\"mailto:\/\/bach.seat@gmail.com\" target=\"_blank\" rel=\"noopener noreferrer\">here<\/a>.<\/em><\/p>\n<\/div>\n","protected":false},"excerpt":{"rendered":"<p>Fujitsu warns that BYOD programs have a lot of hidden costs that IT departments often do not consider<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[4],"tags":[2292,1242,1052,2119,85,2120,4],"class_list":["post-58866","post","type-post","status-publish","format-standard","hentry","category-security","tag-2292","tag-byod","tag-check-point-software-technologies","tag-fujitsu","tag-gartner","tag-mobile-security","tag-security"],"aioseo_notices":[],"_links":{"self":[{"href":"https:\/\/rbach.net\/index.php\/wp-json\/wp\/v2\/posts\/58866","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/rbach.net\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/rbach.net\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/rbach.net\/index.php\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/rbach.net\/index.php\/wp-json\/wp\/v2\/comments?post=58866"}],"version-history":[{"count":23,"href":"https:\/\/rbach.net\/index.php\/wp-json\/wp\/v2\/posts\/58866\/revisions"}],"predecessor-version":[{"id":117298,"href":"https:\/\/rbach.net\/index.php\/wp-json\/wp\/v2\/posts\/58866\/revisions\/117298"}],"wp:attachment":[{"href":"https:\/\/rbach.net\/index.php\/wp-json\/wp\/v2\/media?parent=58866"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/rbach.net\/index.php\/wp-json\/wp\/v2\/categories?post=58866"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/rbach.net\/index.php\/wp-json\/wp\/v2\/tags?post=58866"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}