Look around you.
Youโre probably in an office, with a few different people. Maybe a manager or two. Perhaps youโre in a large open-plan office, so you see dozens of employees surrounding you.
Now look at their phones. Theyโre probably on the table next to them, just sitting idly. Maybe they even have a tablet as well, or a laptop. Theyโre surrounded by devices. Android phones, iOS phones, made by Apple, Samsung, or whoever else. Itโs a tapestry of technology.
Now hold that thought.
Thereโs an interesting story in The Australian today about schools moving to bring-your-own-device programs. Students are told to use electronic gadgets in order to replace their textbooks.
Thereโs also a nice warning in there from IBRS analyst Joe Sweeney, who says schools need to be ready for a โtsunami of devicesโ.
Of course, this makes complete sense. For a while now, schools have mandated students buy a laptop from the school for a certain price. But as laptops and tablets just become more commonplace, it makes sense for students to be able to bring their own laptops and tablets from home.
Yet there are plenty of problems with this approach as well. Running these devices on wireless networks, which the schools are now installing more rapidly, is sure to be trouble.
Now, remember those devices you were looking at earlier in your office?
All of those phones have different things on them, different files and apps. And maybe even some viruses.
Think about what happens when one of those viruses is spreading across your company network. Now the companyโs confidential data is at risk, but if your computer is connected, then so is yours.
If hackers want to infiltrate a company, using the device of an employee is a pretty solid strategy.
So does a bring-your-own-device policy make sense? On a practical level, sure it does. In fact, itโs going to become essential for businesses to operate under these types of flexible policies.
But if you donโt have your security set up properly, then youโre in for a disaster. Schools may not have confidential information worth stealing, but your company certainly does. Be smart and approach your BYOD policy with the care it deserves.