How CIOs Can Navigate Treacherous BYOD Waters

CIO.com's Tom Kaneshige writes that implementing a BYOD program is like setting sail on uncharted seas where danger lurks like pirates. However, if you navigate the waters carefully and batten down the hatches, you can enjoy a smooth journey.

RELATED TOPICS

Why are pirates called "pirates"? Because they just aaaargh! (OK, my niece told me that one, and it's better when she tells it.) This is a cheesy way for me to say that pirates are a good metaphor for BYOD, because confidential data theft is public enemy number 1 for CIOs setting sail for BYOD.

In fact, in many of my stories I've described CIOs as navigating BYOD's troubled waters or making a journey to an undiscovered country with dangers lurking at every turn. Truth be told, BYOD is risky business. Here's a slideshow that shows you what I mean: 12 BYOD Disaster Scenarios.

In July, TEKsystems seemed to agree and created a video called "Navigating Through BYOD: Bring Your Own Device." It touches on a lot of the complex issues CIOs face when implementing a BYOD program, but does so in a very simple way. You're aboard a cartoonish Old World sailing ship embarking on a journey of exploration, one wrought with dangers.

Oh, there are pirates, too.

Tom Kaneshige covers Apple, BYOD and Consumerization of IT for CIO.com. Follow Tom on Twitter @kaneshige. Follow everything from CIO.com on Twitter @CIOonline, Facebook, Google + and LinkedIn. Email Tom at tkaneshige@cio.com

RELATED TOPICS
The CIO 100 Awards recognize companies using IT in innovative ways. Submit an application today!
View Comments
You Might Like
Join the discussion
Be the first to comment on this article. Our Commenting Policies