{"id":203,"date":"2012-07-17T16:19:16","date_gmt":"2012-07-17T23:19:16","guid":{"rendered":"http:\/\/marcbook.local\/wds\/playground\/cybertrust\/2012\/07\/17\/beginners-guide-to-byod-bring-your-own-device\/"},"modified":"2023-05-16T09:46:00","modified_gmt":"2023-05-16T16:46:00","slug":"beginners-guide-to-byod-bring-your-own-device","status":"publish","type":"post","link":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/2012\/07\/17\/beginners-guide-to-byod-bring-your-own-device\/","title":{"rendered":"Beginner\u2019s Guide to BYOD (Bring Your Own Device)"},"content":{"rendered":"

The era of IT departments mandating specific hardware, operating systems, or technologies is quickly eroding.\u00a0 In its place a new culture is growing where employees are granted more autonomy\u2014and given more responsibility\u2014for their own technology.<\/p>\n

If you\u2019ve been to enough parties you\u2019re probably familiar with the term BYOB\u2014a common acronym of the phrase \u201cbring your own beer\u201d. Well, a similar acronym has emerged in recent years as one of the hottest buzzwords in technology: BYOD, or \u201cbring your own device\u201d. Let\u2019s take a deeper look at BYOD, what it is, and the forces that are driving it.<\/p>\n

Bring Your Own Definition <\/b><\/p>\n

The first question to ask is simply, \u201cwhat is BYOD?\u201d<\/p>\n

In a nutshell, BYOD is the idea of allowing employees to use their own laptops, smartphones, tablets, or other devices in a work environment.\u00a0 Instead of the IT department mandating specific hardware or technologies, users are free to use the platforms and gadgets they prefer.<\/p>\n

BYOD vs. Consumerization of IT<\/b><\/p>\n

BYOD is often confused with another trend\u2014Consumerization of IT. Though related, these two topics really have a different pivot or focus.\u00a0 Consumerization refers to consumer technology that bridges over into the workplace \u2013 with the original product features and function being optimized towards consumer needs. Broadly, this means that IT departments must manage devices that were not optimized for enterprise management requirements.<\/p>\n

BYOD is part of consumerization in that it involves using consumer technologies in a work setting, but the focus is on the employee using devices originally purchased for personal use.\u00a0 Because the devices are not employer purchased or owned, it raises significant questions about maintenance, as well as some tough policy questions concerning data and applications on the device.<\/p>\n

Origins of BYOD<\/b><\/p>\n

The popular perception is that the BYOD revolution was sparked by the advent of Apple\u2019s iPhone. The iPhone, and subsequently the iPad, are certainly catalysts that have contributed to the accelerated adoption of BYOD policies in many organizations, but the concept of users wanting to choose their own devices, or use their own personal PCs to get work done predates these devices \u2013 it is just that recently, these percentage of these types of devices in use has grown significantly.\u00a0 Corporate philosophy has had much to do with driving BYOD as well.<\/p>\n

Companies\u2019 IT support policies have been pushing employees to be more independent and autonomous for decades.\u00a0 For years, IT Pros have opted to upgrade sooner and self-manage to get the benefits of new versions of products. It is frustrating for employees to know that a given task can be accomplished faster or easier using a different Web browser, or operating system, or application, but being handicapped by \u201csupported products\u201d dictated by the IT department.<\/p>\n

In the wake of those traditional policies, mobility entered the picture for information workers.\u00a0 Instead of being tethered to a desk sitting in a cubicle, workers increasingly getting work done remotely\u2014from home offices, corner coffee shops, airports, and hotel rooms. Users outside of the office don\u2019t have the same access to IT resources or support, and that has further fostered the need to be self-reliant.<\/p>\n

Even in organizations where the IT department still mandates specific operating systems, hardware platforms, and mobile devices, rogue employees have worked around those requirements to get the job done. Nomadic employees embrace the concept of being independent and autonomous, and manifest it by sometimes ignoring company policy and choosing the tools that help them be more effective, and work more efficiently.<\/p>\n

Pros and Cons<\/b><\/p>\n

BYOD comes with distinct advantages, as well as unique drawbacks for both organizations and individuals. From the standpoint of the IT department, BYOD is generally seen as a cost-cutting measure because the burden of supplying the equipment is shifted to the employees. Some organizations subsidize BYOD policies with a per diem to offset the costs for users, but it still results in lower costs by relieving IT of its traditional role of maintenance and support.<\/p>\n

Another advantage of BYOD is that individuals tend to upgrade and embrace new platforms and technologies much faster than businesses. The organization benefits from being able to take advantage of cutting edge tools and features without the pain of deploying a hardware refresh to the entire company.<\/p>\n

From the user\u2019s perspective, BYOD means using devices and applications that are more familiar, and which the user is more comfortable with. Being able to choose which hardware and platforms creates more satisfied and productive workers.<\/p>\n

There are also some significant downsides to consider, though. The organization has to address the fact that rogue devices outside of the control of the IT department might connect with corporate data and network resources, and the users have to accept the fact that BYOD comes with some policies that may limit their freedom with their own device.<\/p>\n

BYOD Risks<\/b><\/p>\n

There are some hurdles that organizations need to cross in order to effectively implement BYOD. The risks associated with allowing users to bring their own computers or mobile devices into the work environment vary depending on geographic region, the industry the company works in, and even the specific job role within a company.<\/p>\n

Businesses that operate in specific industries\u2014like healthcare or finance\u2014fall under strict regulatory compliance mandates. SOX, HIPAA, GLBA, PCI-DSS, and other compliance frameworks outline which data must be protected, and provide basic guidelines for how that data should be protected. The obligation to comply with these directives doesn\u2019t change just because the data is moved from company-owned equipment to employee-owned devices in a BYOD situation.<\/p>\n

There are frequently reports of sensitive customer or employee data being potentially compromised as a result of a laptop being taken from an unlocked car, or company data being compromised by an employee leaving a smartphone in a taxi. IT admins need to have BYOD policies in place to protect data no matter where it resides\u2014even on devices that aren\u2019t owned or managed by the company.<\/p>\n

The challenges of BYOD are not necessarily a reason to ban the practice altogether, though. The trend has significant momentum, and there are a number of benefits for both companies and users. The trick is for both to understand the advantages, as well as the issues, and to employ BYOD in a way that works for everyone.<\/p>\n

Join me for the next part of this BYOD series in a few days, when I dig into a deeper look at BYOD from the employee perspective.<\/p>\n

Best regards, Jeff (@securityjones<\/a>)<\/p>\n

<\/div>\n","protected":false},"excerpt":{"rendered":"

The era of IT departments mandating specific hardware, operating systems, or technologies is quickly eroding.\u00a0 In its place a new culture is growing where employees are granted more autonomy\u2014and given more responsibility\u2014for their own technology. If you\u2019ve been to enough parties you\u2019re probably familiar with the term BYOB\u2014a common acronym of the phrase \u201cbring your […]<\/p>\n","protected":false},"author":61,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"ep_exclude_from_search":false,"_classifai_error":"","footnotes":""},"content-type":[3662],"topic":[3670],"products":[],"threat-intelligence":[],"tags":[3822],"coauthors":[3653],"class_list":["post-203","post","type-post","status-publish","format-standard","hentry","content-type-news","topic-device-management","tag-microsoft-security-insights"],"yoast_head":"\nBeginner\u2019s Guide to BYOD (Bring Your Own Device) | Microsoft Security Blog<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/2012\/07\/17\/beginners-guide-to-byod-bring-your-own-device\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Beginner\u2019s Guide to BYOD (Bring Your Own Device) | Microsoft Security Blog\" \/>\n<meta property=\"og:description\" content=\"The era of IT departments mandating specific hardware, operating systems, or technologies is quickly eroding.\u00a0 In its place a new culture is growing where employees are granted more autonomy\u2014and given more responsibility\u2014for their own technology. If you\u2019ve been to enough parties you\u2019re probably familiar with the term BYOB\u2014a common acronym of the phrase \u201cbring your […]\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/2012\/07\/17\/beginners-guide-to-byod-bring-your-own-device\/\" \/>\n<meta property=\"og:site_name\" content=\"Microsoft Security Blog\" \/>\n<meta property=\"article:published_time\" content=\"2012-07-17T23:19:16+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2023-05-16T16:46:00+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-content\/uploads\/2018\/08\/cropped-microsoft_logo_element.png\" \/>\n\t<meta property=\"og:image:width\" content=\"512\" \/>\n\t<meta property=\"og:image:height\" content=\"512\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"Jeff Jones\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Jeff Jones\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"4 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/2012\/07\/17\/beginners-guide-to-byod-bring-your-own-device\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/2012\/07\/17\/beginners-guide-to-byod-bring-your-own-device\/\"},\"author\":[{\"@id\":\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/author\/jeff-jones\/\",\"@type\":\"Person\",\"@name\":\"Jeff Jones\"}],\"headline\":\"Beginner\u2019s Guide to BYOD (Bring Your Own Device)\",\"datePublished\":\"2012-07-17T23:19:16+00:00\",\"dateModified\":\"2023-05-16T16:46:00+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/2012\/07\/17\/beginners-guide-to-byod-bring-your-own-device\/\"},\"wordCount\":1092,\"publisher\":{\"@id\":\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/#organization\"},\"keywords\":[\"Microsoft Security Insights\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/2012\/07\/17\/beginners-guide-to-byod-bring-your-own-device\/\",\"url\":\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/2012\/07\/17\/beginners-guide-to-byod-bring-your-own-device\/\",\"name\":\"Beginner\u2019s Guide to BYOD (Bring Your Own Device) | Microsoft Security Blog\",\"isPartOf\":{\"@id\":\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/#website\"},\"datePublished\":\"2012-07-17T23:19:16+00:00\",\"dateModified\":\"2023-05-16T16:46:00+00:00\",\"breadcrumb\":{\"@id\":\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/2012\/07\/17\/beginners-guide-to-byod-bring-your-own-device\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/2012\/07\/17\/beginners-guide-to-byod-bring-your-own-device\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/2012\/07\/17\/beginners-guide-to-byod-bring-your-own-device\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Beginner\u2019s Guide to BYOD (Bring Your Own Device)\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/#website\",\"url\":\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/\",\"name\":\"Microsoft Security Blog\",\"description\":\"Expert coverage of cybersecurity topics\",\"publisher\":{\"@id\":\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/#organization\",\"name\":\"Microsoft Security Blog\",\"url\":\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-content\/uploads\/2018\/08\/cropped-cropped-microsoft_logo_element.png\",\"contentUrl\":\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-content\/uploads\/2018\/08\/cropped-cropped-microsoft_logo_element.png\",\"width\":512,\"height\":512,\"caption\":\"Microsoft Security Blog\"},\"image\":{\"@id\":\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/#\/schema\/logo\/image\/\"}}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Beginner\u2019s Guide to BYOD (Bring Your Own Device) | Microsoft Security Blog","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/2012\/07\/17\/beginners-guide-to-byod-bring-your-own-device\/","og_locale":"en_US","og_type":"article","og_title":"Beginner\u2019s Guide to BYOD (Bring Your Own Device) | Microsoft Security Blog","og_description":"The era of IT departments mandating specific hardware, operating systems, or technologies is quickly eroding.\u00a0 In its place a new culture is growing where employees are granted more autonomy\u2014and given more responsibility\u2014for their own technology. If you\u2019ve been to enough parties you\u2019re probably familiar with the term BYOB\u2014a common acronym of the phrase \u201cbring your […]","og_url":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/2012\/07\/17\/beginners-guide-to-byod-bring-your-own-device\/","og_site_name":"Microsoft Security Blog","article_published_time":"2012-07-17T23:19:16+00:00","article_modified_time":"2023-05-16T16:46:00+00:00","og_image":[{"width":512,"height":512,"url":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-content\/uploads\/2018\/08\/cropped-microsoft_logo_element.png","type":"image\/png"}],"author":"Jeff Jones","twitter_card":"summary_large_image","twitter_misc":{"Written by":"Jeff Jones","Est. reading time":"4 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/2012\/07\/17\/beginners-guide-to-byod-bring-your-own-device\/#article","isPartOf":{"@id":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/2012\/07\/17\/beginners-guide-to-byod-bring-your-own-device\/"},"author":[{"@id":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/author\/jeff-jones\/","@type":"Person","@name":"Jeff Jones"}],"headline":"Beginner\u2019s Guide to BYOD (Bring Your Own Device)","datePublished":"2012-07-17T23:19:16+00:00","dateModified":"2023-05-16T16:46:00+00:00","mainEntityOfPage":{"@id":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/2012\/07\/17\/beginners-guide-to-byod-bring-your-own-device\/"},"wordCount":1092,"publisher":{"@id":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/#organization"},"keywords":["Microsoft Security Insights"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/2012\/07\/17\/beginners-guide-to-byod-bring-your-own-device\/","url":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/2012\/07\/17\/beginners-guide-to-byod-bring-your-own-device\/","name":"Beginner\u2019s Guide to BYOD (Bring Your Own Device) | Microsoft Security Blog","isPartOf":{"@id":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/#website"},"datePublished":"2012-07-17T23:19:16+00:00","dateModified":"2023-05-16T16:46:00+00:00","breadcrumb":{"@id":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/2012\/07\/17\/beginners-guide-to-byod-bring-your-own-device\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.microsoft.com\/en-us\/security\/blog\/2012\/07\/17\/beginners-guide-to-byod-bring-your-own-device\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/2012\/07\/17\/beginners-guide-to-byod-bring-your-own-device\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/"},{"@type":"ListItem","position":2,"name":"Beginner\u2019s Guide to BYOD (Bring Your Own Device)"}]},{"@type":"WebSite","@id":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/#website","url":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/","name":"Microsoft Security Blog","description":"Expert coverage of cybersecurity topics","publisher":{"@id":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/#organization","name":"Microsoft Security Blog","url":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-content\/uploads\/2018\/08\/cropped-cropped-microsoft_logo_element.png","contentUrl":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-content\/uploads\/2018\/08\/cropped-cropped-microsoft_logo_element.png","width":512,"height":512,"caption":"Microsoft Security Blog"},"image":{"@id":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/#\/schema\/logo\/image\/"}}]}},"msxcm_display_generated_audio":false,"distributor_meta":false,"distributor_terms":false,"distributor_media":false,"distributor_original_site_name":"Microsoft Security Blog","distributor_original_site_url":"https:\/\/www.microsoft.com\/en-us\/security\/blog","push-errors":false,"_links":{"self":[{"href":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-json\/wp\/v2\/posts\/203"}],"collection":[{"href":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-json\/wp\/v2\/users\/61"}],"replies":[{"embeddable":true,"href":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-json\/wp\/v2\/comments?post=203"}],"version-history":[{"count":0,"href":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-json\/wp\/v2\/posts\/203\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-json\/wp\/v2\/media?parent=203"}],"wp:term":[{"taxonomy":"content-type","embeddable":true,"href":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-json\/wp\/v2\/content-type?post=203"},{"taxonomy":"topic","embeddable":true,"href":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-json\/wp\/v2\/topic?post=203"},{"taxonomy":"products","embeddable":true,"href":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-json\/wp\/v2\/products?post=203"},{"taxonomy":"threat-intelligence","embeddable":true,"href":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-json\/wp\/v2\/threat-intelligence?post=203"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-json\/wp\/v2\/tags?post=203"},{"taxonomy":"author","embeddable":true,"href":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-json\/wp\/v2\/coauthors?post=203"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}