Choose your language:

Hong Kong
New Zealand
United Kingdom
United States

Mobile workers want convenience with BYOD

September 09, 2013

Bring-your-own-device (BYOD) policies are complicating businesses' strategies for securing company data and requiring additional IT staff to handle implementation and upkeep. 

As a result, companies and workers are clamoring for more convenient solutions when using BYOD to access files and information via the cloud on their mobile devices. In fact, some cloud service providers are finding that simplicity is the key to pleasing BYOD users.

What do workers want?
Mobile workers want the ability to do all of their normal business tasks through BYOD, but don't want to jump through numerous hoops to do so, Brendan Samuels, Cortado APAC sales manager, told ARN Net. This includes everyday responsibilities such as keeping up with emails, as well as more specialized operations like sending corporate documents.

"They still want to have the flexibility of using those files in terms of being able to PDF a contract and send it to someone on the go," explained Samuels.

But risks still loom
As any firm that has begun the process of moving to BYOD knows, the strategy is far from having all the kinks worked out, with security remaining a top concern.

Yet the threats to security do not stem purely from outside hackers. In fact, employees may be one of the greatest risks with which IT support must contend, ARN explained. Some staff members may find the browsing or access limitations placed upon them too restrictive and try to disable security features.

"However, if that device was lost or stolen, it could be easily hacked and intellectual property can be sourced by the wrong people," Samuels said.

Technology soon may make it a bit harder for hackers to gain access to the information on a stolen mobile device. Biometrics companies are investigating how to make smartphones more secure by embedding a fingerprint reader in the devices. In fact, the newest iPhone model is rumored to have this feature, which would use the unique identifier to allow only its owner to access files and make payments, Bloomberg Businessweek reported.

Fingerprints would ultimately replace passwords and signatures, according to the news source. For businesses embracing BYOD, this would ease worries over what happens to a stolen device, because if the technology worked properly, no one would be able to unlock the smartphone without the owner present.

Blog Archive