How CIOs Can Navigate Treacherous BYOD Waters

CIO.com's Tom Kaneshige writes that implementing a BYOD program is like setting sail on uncharted seas where danger lurks like pirates. However, if you navigate the waters carefully and batten down the hatches, you can enjoy a smooth journey.

Why are pirates called "pirates"? Because they just aaaargh! (OK, my niece told me that one, and it's better when she tells it.) This is a cheesy way for me to say that pirates are a good metaphor for BYOD, because confidential data theft is public enemy number 1 for CIOs setting sail for BYOD.

In fact, in many of my stories I've described CIOs as navigating BYOD's troubled waters or making a journey to an undiscovered country with dangers lurking at every turn. Truth be told, BYOD is risky business. Here's a slideshow that shows you what I mean: 12 BYOD Disaster Scenarios.

In July, TEKsystems seemed to agree and created a video called "Navigating Through BYOD: Bring Your Own Device." It touches on a lot of the complex issues CIOs face when implementing a BYOD program, but does so in a very simple way. You're aboard a cartoonish Old World sailing ship embarking on a journey of exploration, one wrought with dangers.

Oh, there are pirates, too.

Tom Kaneshige covers Apple, BYOD and Consumerization of IT for CIO.com. Follow Tom on Twitter @kaneshige. Follow everything from CIO.com on Twitter @CIOonline, Facebook, Google + and LinkedIn. Email Tom at tkaneshige@cio.com

To comment on this article and other CIO content, visit us on Facebook, LinkedIn or Twitter.
Download the CIO October 2016 Digital Magazine
Notice to our Readers
We're now using social media to take your comments and feedback. Learn more about this here.