All About BYOD

BYOD (Bring You Own Device) promises many benefits such as greater innovation, better work-life balance and improved productivity, but it also increases pressure on IT to manage and secure devices and data. How to do BYOD successfully is a challenge. CIO.com's BYOD guide offers a variety of resources and strategies to help you navigate the many pros and cons, security issues, costs and more.

The rise of BYOD is making an impact on a variety of IT positions, from help desk to mobile app development to security and compliance. In fact, according to one research firm, it's one of the only bright spots on the IT jobs landscape.

BYOD Became the 'New Normal' in 2013

CIOs have had eventful year when it comes to BYOD. Concerns over hidden costs, employee privacy and corporate data security gave way to convenience. However, mobile device management vendors stepped in to help IT sell the concept of compliance and lawyers and the National Labor Relations Board jumped in to the aid of employees smacked with draconian BYOD policies.

12 BYOD Disaster Scenarios

Everyone seems to be jumping on the Bring Your Own Device bandwagon, but it's a bumpy ride. There are many ways to fall off and get a bloody nose (or worse). As the BYOD reality catches up to the hype, here are 12 very real disaster scenarios.

Pros and Cons of BYOD (Bring Your Own Device)

The concept of bring your own device BYOD is a growing trend for business IT. There are a variety of benefits to allowing users to supply their own PC and mobile devices, but there are also some concerns. Make sure you understand both in order to embrace BYOD with confidence.

CIO's Digital Spotlight on BYOD

Learn how to take control of and benefit from the bring-your-own-devices (BYOD) phenomenon--without losing corporate data. This free, downloadable special edition describes what your BYOD policy should cover and outlines the risks you need to manage.

Which Workers Are the Best Fit for BYOD?

From the always-on salesperson to the clock-punching hourly worker, companies will need to weigh the pros and cons of including each worker type in a BYOD program. Are BYOD Workers More Productive?

Most people prefer using their personal smartphone or tablet for work than a company-issued one. Does this mean their productivity will increase? Probably, says Aberdeen Group.

When BYOD Is a Productivity Killer

BYOD programs are designed to increase productivity, but that's not the case when employees take BYOD phones on international vacations and never check in on work because the company won't pay roaming charges on a non-corporate phone.

Cartoon: Consumerization of IT Gets Comical

Hey IT, don't let vendors pass you by.

Infographic: BYOD's Meteoric Rise

The BYOD (bring your own device) movement hit a full sprint in 2012 and the following infographic puts BYOD data in colorful perspective. But is a BYOD reality check coming in 2013?

Consumerization of IT: The Next E- Commerce?

Eventually the consumerization of IT movement will go the way of e-commerce and just be something everybody has.

BYOD Empowers the Free Agent

Consumer tech frees employees from the old lie of corporate loyalty rewarded.

Why the Midmarket Is Overlooking Benefits of BYOD

BYOD has the potential in the midmarket to empower smaller workforces. If mishandled with loose rules and complex legalese, though, BYOD can lead to increased feelings of isolation. Here's how the midmarket can make BYOD work for them.

BYOD Policy & Legal

BYOD Stirs Up Legal Problems

Does BYOD put your company in murky legal water? You bet. Employees need protections, too. Secret Video and Audio Recordings a Legal Minefield for Employers

Thanks to smartphones and wearable technology such as Google Glass recording illegal or inappropriate conversations and behavior in the office couldn't be easier. If your company has a BYOD policy this could spell disaster.

How Forensic Tools Unearth Deleted Text Messages

A mobile security guru offers a quick rundown of forensic tools and how they retrieve deleted SMS. How to Craft the Best BYOD Policy

What is a good BYOD policy? Step one is to clarify the rights of both company and employee and state upfront what's business and what's personal. But there's a lot more to it. In this interview with a technology transactions lawyer, CIO.com explores the do's and don'ts of BYOD policies.

Three BYOD Approaches -- and the Budget Impact

Love it or hate it, BYOD is likely already affecting security, network performance and your budget (it can drive up costs by more than a third, according to some researchers). Here are three approaches to address these challenges.

BYOD Lawsuits Loom as Work Gets Personal

Will BYOD lead to a rash of lawsuits from employees who feel violated? Or maybe a headline-grabbing, class-action lawsuit? Your company better make sure it has an explicit terms-of-use BYOD agreement. Here are ways companies can protect themselves. Mandatory BYOD Heading Your Way

To land or keep a job people may soon be forced to buy a personal smartphone, sign away some of their privacy rights and use the phone for work. It's called a BYOD mandate and, according to research firm Gartner, you better get ready for it.

BYOD in Bloom, According to Survey

A Cisco survey of mobile users reveals strong desire for BYOD programs and clear productivity gains. But hold off on those BYOD mandates because the love for corporate devices hasn't burned out yet.

5 BYOD Pitfalls and How You Can Avoid Them

Vague policies, rogue apps, zombie phones can doom even the best 'Bring Your Own Device' intentions. But the good news is it's not too late to make game-changing adjustments.

BYOD Gets Messy with AT&T Class Action Lawsuit

With a BYOD twist, AT&T agreed to settle a class action lawsuit for overcharging corporate customers for almost seven years. But like most things involving BYOD, this gets complicated.

7 Tips for Establishing a Successful BYOD Policy

If you haven't developed a corporate Bring Your Own Device policy, or if the one you have is out of date, these tips will help you address device security, IT service, application use and other key components of an effective BYOD policy.

Embrace Consumerization of IT and Stop Saying No

At CITE Forum, Noah Broadwater, CTO of Sesame Workshop, explains how his IT organization learned to stop being gatekeepers and instead be partners and advocates for the business. BYOD and Smartphones: Ingram Micro Goes Global

After crafting a voluntary global BYOD smartphone policy, Ingram Micro sees a spike in adoption, including a new U.S. mandate.

BYOD Security & Privacy

Tablets, Mobile Malware Heighten BYOD Security Concerns

With the increased popularity of powerful tablets and the rise in mobile malware, it's no surprise that Forrester research released today shows that IT managers feel uneasy about BYOD.

Are Businesses Rushing to BYOD Too Quickly?

A survey of IT executives and IT pros paints a disturbing picture of BYOD. That picture includes a lack of confidence in compliance with federally mandated regulations, a fear that sensitive data is at risk and uncertainty about the overall effectiveness of BYOD. CIO Takes Action to Solve BYOD's Privacy Problem

The BYOD policy at a California law firm earned the CIO the nickname of Big Brother. However, the sarcasm stopped when he sprang into action and saved the day when an attorney's smartphone was swiped. The case represents the love-hate relationship workers and IT management have with BYOD.

The BYOD Mobile Security Threat Is Real

Cloud storage, text messaging, poor accountability and the "Bad Leaver" open the doors to data breaches in a BYOD environment, says a cyber- crime expert in this CIO.com interview.

How IT Can Scare Off BYOD Monsters in the Closet

When it comes to security risks, BYOD is the gift that keeps on giving. But what about the devices that your employees used to use, gave up on and, months later, finally dug out of the closet to sell? That's another issue to wrestle with. Here are seven ways to beat the monsters.

BYOD Security Concerns: Does IT Protest Too Much?

Mobile security concerns about bring-your-own devices are overblown, says an IT security expert in this CIO.com Q&A.

For BYOD Best Practices, Secure Data, Not Devices

IT organizations are justifiably concerned about the security risks inherent in bringing your own device (BYOD). Many are turning to mobile device management (MDM) products and services to address the problem. But a number of mobile security vendors believe organizations are focusing the device when they should be focusing on the data.

BYOD Policy: Employee Right to Social Media Privacy Is Paramount

BYOD guidelines are just being defined, but one warning must rise above the din: never, ever, try to gain unauthorized access to an employee's private social networking site.

Are BYOD Employees Decommissioning Mobile Devices Properly?

An information security officer recommends adding procedures for decommissioning devices to your BYOD policy before your BYOD employees upgrade to the latest smartphones and tablets this holiday season.

BYOD Privacy: Are You Being Watched?

Mobile technology and BYOD give companies Orwellian power, testing the relationship between employers and employees. So far, there's a severe lack of trust that is impeding BYOD progress, says a new survey. BYOD Security Demands Mobile Data Protection Strategy

As federal agencies develop strategies for an increasingly mobile workforce, the traditional methods of securing a desktop environment have to evolve to account for the growing crop of wireless devices in use. Symantec vice president of public sector urges federal CIOs to embrace BYOD, but to update their security posture to also focus on files and applications.

BYOD: Big Security, Small Devices

With the popularity of smartphones and tablets among workers, IT departments are trying to accommodate the influx of consumer tech -- and manufacturers are trying to help. Here are some consumer devices that have been tweaked for the enterprise -- and the software that's being used. BYOD: Time to Adjust Your Privacy Expectations

Employees who want to use their smartphones and tablets for work better be prepared to sign on IT's dotted line and essentially give away their privacy rights.

The BYOD Troubleshoot: Security and Cost-Savings

Bring-your-own-device, or BYOD, programs in the enterprise can liberate employees and trim the bottom line. But it also brings hidden costs and security risks to a corporate network. Here's what enterprise IT is doing to secure personal devices and maximize the ROI potential of the BYOD movement.

BYOD: What Can We Learn from China?

U.S. employees may never be as accepting as the Chinese about BYOD's potential privacy violations, but American companies can still learn a lot about effective BYOD from China, namely, better educating workers about security.

BYOD Costs

BYOD Planning and Costs: Everything You Need to Know

Bring Your Own Device programs promise to remove the cost of smartphones from a company's balance sheet. But most companies transitioning from company-issued smartphones to BYOD aren't even breaking even. Here's a breakdown on BYOD's hidden costs and some tips from those in the trenches on how to make BYOD work for your business.

Zombie Phones Are Attacking Your Mobile Budget

In the brave new world of BYOD, zombie phones are most likely lurking in your enterprise. As company-owned mobile phones are replaced by employee-owned devices, corporate billing from carriers sometimes lives on. Are these undead phones eating away at your tech budget?

A Visual Guide to Identifying the Hidden Costs of BYOD

When it comes to mobile devices, hidden costs are everywhere. There's a good chance your company is paying for something it shouldn't be, and this infographic will help you spot the unintended financial consequences of employee mobility. Where's the BYOD Payoff?

Companies may be bleeding corporate dollars in the name of BYOD productivity gains that don't really exist, says Nucleus Research.

Does BYOD Cost Too Much?

It's a good bet you don't know how much your company is spending on all those "Bring Your Own Device" smartphones and tablets. Even worse, it's probably too much, says a mobility management expert. Infographic: BYOD's Dirty Little Secret

Are your employees taking liberties with their BYOD expense reporting?

BYOD Myths: Cost Savings, Productivity Gains, Less Headaches

Mobi Wireless Management's Brandon Hampton advises Fortune 100 companies transitioning from corporate-owned devices to bring-your-own devices, or BYOD and in this Q&A with CIO.com you'll be surprised at what he tells them.

BYOD: If You Think You're Saving Money, Think Again

Mobile BYOD will cost you about 33 percent more than a company-owned mobile device approach, says Aberdeen Group. Here are five hidden costs. The BYOD Troubleshoot: Security and Cost-Savings

Bring-your-own-device, or BYOD, programs in the enterprise can liberate employees and trim the bottom line. But it also brings hidden costs and security risks to a corporate network. Here's what enterprise IT is doing to secure personal devices and maximize the ROI potential of the BYOD movement.

CIOs, IT Decision-Makers, IT Organization and BYOD

Why One CIO Is Saying 'No' to BYOD

A growing backlash threatens to thwart the BYOD movement. To illustrate the trend, the CIO of a large electrical contractor explains why his company will 'never have a BYOD environment.'

What Is Going Wrong With BYOD?

1 2 3 Page 1
Page 1 of 3
Get the best of CIO ... delivered. Sign up for our FREE email newsletters!