Skip to main content
Tech Radar Tech Radar Pro Tech Radar Gaming
TechRadar TechRadar the business technology experts
SG EditionSingapore
DK EditionDanmark FI EditionSuomi NO EditionNorge SE EditionSverige UK EditionUK IT EditionItalia NL EditionNederland BE (NL) EditionBelgië (Nederlands) FR EditionFrance DE EditionDeutschland ES EditionEspaña
US EditionUS (English) CA EditionCanada MX EditionMéxico
AU EditionAustralia NZ EditionNew Zealand
RSS
Sign in
  • View Profile
  • Sign out
Don't miss these
A Dell 14 Premium sitting on a desk
Pro Best business laptop of 2026
Person working on laptop in kitchen
Software & Services Best remote desktop software of 2025
A woman sits in a public space and checks a mobile phone while working on a laptop.
Pro Best file syncing solution of 2026
Caution sign data unlocking hackers. Malicious software, virus and cybercrime, System warning hacked alert, cyberattack on online network, data breach, risk of website
Security Most SMBs aren't set up to survive a major cyberattack - here's what needs to be done
AI writer
Pro How organizations can mitigate shadow AI without stifling innovation
Cyber-security
Pro The human paradox at the center of modern cyber resilience
A backpack, ThinkPad, reMarkable 2 tablet, and Anker Soundcore P20i earbuds on a blue background in front of a TechRadar radar symbol
Pro The ultimate mobile office loadout: Turn your backpack into a mobile HQ with the pro-grade gear you need to work absolutely anywhere
A representation of cloud backup and cloud storage overlayed on a person using a laptop.
Pro Best business cloud storage of 2026
An abstract image of digital security.
Pro How CIOs can shift from patch and pray to risk-based software change
IT Department
Pro Data sovereignty: not just an issue for governments
iPad Pro
Software & Services Best productivity app for iPad of 2025
Representational image of a dynamic computer network.
Pro Data sovereignty: an existential issue for nations and enterprises
phone security
Pro This intriguing startup wants to create the world's most secure smartphones - and it's doing it Proton-style
Password recovery concept image showing man typing on a keyboard with an overlay imitating password recovery and data recovery principles
Pro Passwords are still a problem for UK businesses - what next?
Cloud, networking and internet
Phone & Communications 5 common mistakes businesses make when choosing their broadband provider
Trending
  • Best office chairs
  • Best 3D printers
  • Best antivirus
  • Best web hosting
  • Best website builder
  • Expert Insights
  1. Pro
  2. Security

What is BYOD and why is it important?

News
By Dean Evans last updated 2 January 2020

Using your own devices at work can be a game-changer.

When you purchase through links on our site, we may earn an affiliate commission. Here’s how it works.

Introduction

Introduction

As many IT departments struggle to keep up with yearly technology changes, company employees increasingly want to use their own devices to access corporate data.

It's part of a growing trend dubbed Bring Your Own Device (BYOD), which encompasses similar Bring Your Own Technology (BYOT), Bring Your Own Phone (BYOP) and Bring Your Own PC (BYOPC) initiatives. All of them have evolved to empower workforces through the so-called 'consumerisation of IT'.

As part of this consumerisation, BYOD encourages company employees to work on the device they choose - accessing corporate email, viewing text documents and much more. The goal for SMBs? Increased productivity and reduced costs.

But BYOD also has a darker side. If not fully understood and regulated, it can threaten IT security and put a company's sensitive business systems at risk.

Page 1 of 6
Page 1 of 6
Why BYOD matters

Why BYOD matters

The driving force behind BYOD is a new IT self-sufficiency among company employees who already own and use personal laptops, tablets and smartphones.

These mobile devices are often newer and more advanced than the equipment deployed by many IT departments. It's hardly surprising that the rapid adoption of lightweight Ultrabooks, iPads and large-screened phones are changing the way that people want to work.

IT departments are playing catch up and could easily refuse to embrace the BYOD idea. Surely it's simpler to provide approved hardware and software applications so you can retain full control over them?

But Richard Absalom, an analyst at Ovum, believes that BYOD will happen whether a company plans for it or not. He says: "Trying to stand in the path of consumerised mobility is likely to be a damaging and futile exercise." The best thing that an SMB or enterprise can do is be aware of the benefits and understand the risks.

Page 2 of 6
Page 2 of 6
BYOD benefits and advantages

BYOD benefits and advantages

There are some key advantages to operating a BYOD strategy, including increased employee satisfaction (they can work more flexibly), cost savings (reduced hardware spend, software licensing and device maintenance) plus productivity gains (employees are happier, more comfortable and often work faster with their own technology).

As Mark Coates, EMEA VP at Good Technology, points out: "By enabling employees to securely and easily access corporate data on their own device, productivity levels will naturally increase. In terms of cost savings, there are huge benefits, since SMBs will not have to manage and fund a second device for employees."

Shaun Smith, technology practice director at Xceed Group, agrees. "At Xceed Group, allowing the use of consumer devices has helped improve both productivity and staff motivation," he says. But he also strikes a note of caution. "For a company to decide if a BYOD strategy would work for them they need to ensure due diligence is conducted - simply evaluating the benefits versus risks."

Page 3 of 6
Page 3 of 6
BYOD risks and disadvantages

BYOD risks and disadvantages

While BYOD sounds attractive, businesses need to consider the full implications of allowing corporate data to be accessed on personal devices that they could have little or no control over. What data can employees have access to? What security measures are in place if an employee's device is lost, stolen or compromised?

This is where convenience clashes with security. "Security and the loss of devices with limited password protection is naturally a key concern," adds Smith. "Increased consumerisation in the workplace can bring with it an increased risk from threats such as hackers and viruses."

There might also be cost implications. Even though IT hardware spend can potentially be reduced with a BYOD approach, it may cost more for a company to integrate and support a diverse range of employee devices. As Coates points out: "Android devices can be complex to manage as there are just so many different flavours - a huge variety of devices and a number of different versions of the operating system."

By far the biggest risk is not having any sort of BYOD policy in place. "Businesses need to recognise the importance of taking action," says Smith. "After all, by ignoring the problem they may unwittingly expose themselves to attack and, as a result, legislative or reputational threats."

Page 4 of 6
Page 4 of 6
Planning a BYOD policy

Planning a BYOD policy

The advent of BYOD is forcing IT departments and IT managers to develop and implement policies that govern the management of unsupported devices. Network security is paramount. Beyond passcode-protecting employee devices, these policies might involve encrypting sensitive data, preventing local storage of corporate documents and/or limiting corporate access to non-sensitive areas.

"The first step for IT managers is to truly understand the problem they are trying to solve," suggests Coates. "And find the solution that matches. In addition to addressing immediate needs, the right solution will be scalable and manageable, and can grow with an organisation as its mobility strategy evolves and changes."

Coates outlines three stages for implementing a BYOD policy, starting with secure device management. "This is the basic functionality of managing devices, both those employee-bought or company-supplied. Let employees work on mobile devices and make sure nothing catastrophic happens. This leads to great improvements in productivity and loyalty.

"However, it's at stages two and three where true mobile productivity and insight comes in, as the focus shifts to mobile applications and data. First by tracking and deploying mobile applications and then establishing mobile collaboration through secure app-to-app workflows, where mobility can be a true catalyst for change."

Page 5 of 6
Page 5 of 6
Implementing a BYOD policy

Implementing a BYOD policy

There are already several key players providing BYOD solutions, ranging from complete sandboxed access through to more lightweight (but user-friendly) solutions, which are policy-driven. The key issue is to guard against data loss or leakage.

Smith has some practical advice for anyone trying to develop a BYOD policy: "Where any device accesses or stores corporate data, a full risk assessment should be carried out against a variety of threats, and appropriate mitigations put in place. This could include anti-malware, encryption, passcodes, remote wipe, preventing jailbreaking, and sandboxing.

An effective BYOD solution will enable you to secure the data, not just the device. With this approach, IT departments need not worry about compromising security in the name of usability.

"All in all, [BYOD] is about being innovative and helping your employees to work better," says Coates. "Employees want to use the devices that they are comfortable with in the workplace. They want to have the same experience at work that they have at home. People are used to using applications now, rather than browser-based solutions. By giving employees what they want, companies will ultimately benefit."

  • Now read: Laptop vs tablet: which is best for a small business?
Page 6 of 6
Page 6 of 6
Dean Evans
Share by:
  • Facebook
  • X
  • Whatsapp
  • Reddit
  • Pinterest
  • Flipboard
  • Threads
  • Email
Share this article
Join the conversation
Follow us
Add us as a preferred source on Google
Read more
A menacing hand shadow on a computer keyboard in front of printed computer data.
Shadow IT is threatening businesses from within - and today’s security tools simply can’t keep up
 
 
Person working at a desk
Remote work and the big breaches of 2025: Cause or convenient excuse?
 
 
SaaS Concept, Software as a Service, A man types smartphone with digital icons representing various aspects of Software as a Service (SaaS), emphasizing modern technology platforms and cloud computing
VDI, SaaS, and DaaS uncovered: what businesses need to know
 
 
IA y ciberseguridad
The new age of layered security: from supply chains to endpoints
 
 
Security padlock and circuit board to protect data
Print security means business security: protecting data across the physical-digital boundary
 
 
SaaS Concept, Software as a Service, A man types smartphone with digital icons representing various aspects of Software as a Service (SaaS), emphasizing modern technology platforms and cloud computing
IT bosses are still searching for that perfect mix of security and productivity when it comes to office software
 
 
Latest in Security
Pirate skull cyber attack digital technology flag cyber on on computer CPU in background. Darknet and cybercrime banner cyberattack and espionage concept illustration.
Massive identity theft campaign targeting Okta single sign-on at over 100 top businesses - make sure your firm stays safe
 
 
Microsoft Office
Worrying Microsoft Office security flaw patched - update now or risk hackers accessing your files
 
 
Google Chrome app is seen on an iPhone next to Edge and other web browser apps. Microsoft is using new prompts in Edge to try and stop users from downloading Chrome.
A new malware service promises to skip Google's review process and get your malware straight onto the Chrome Store
 
 
An abstract image of digital security.
Experts flag around 800,000 Telnet servers exposed to remote attacks - here's why users should be on their guard
 
 
Security alert showing on a computer monitor
IT teams are being hit with outages due to missing vital alerts
 
 
Nike student discount
Nike investigating mega security breach as hackers claim to have stolen 1.4TB of data
 
 
Latest in News
Travel Photographer of the Year 2025 winner Athanasios Maloukos' winning portfolio called Night of Sorrows: The 'Yacente' Procession of Zamora, Holy Thursday
How 2025's Travel Photographer of the Year used 'immense skill' in low light to create in-camera magic
 
 
How to watch A Super Progresive Movie online – where to stream Australian political comedy from anywhere in the world
How to watch A Super Progressive Movie online from anywhere — stream Australian viral comedy
 
 
Emmanuel Macron delivering a speech in sunglasses
French President takes aim at ‘American platforms’ and ‘Chinese algorithms’ as France moves to ban social media for under-15s
 
 
ExpressVPN and Kape
ExpressVPN kills legacy apps – you have time until March 31 to update yours
 
 
Google AI Overviews
Google Search gives AI Overviews Gemini 3 upgrade and and AI Mode connection
 
 
Adobe Photoshop updates in action, showing AI tools and layers to adjust the photograph's subject
Adobe's game-changing Photoshop update finally adds the tool every creative has been asking for – and I can't believe it took this long
 
 
LATEST ARTICLES
  1. 1
    Who needs 5G, or even 6G? New breakthrough can transmit at 15 gigabytes per second - that's enough for a whole weekend's worth of movies
  2. 2
    'Shot in low light, these images require immense skill to get right' – see the Travel Photographer of the Year 2025 and the stunning in-camera winning images
  3. 3
    Not sure what HDMI port to use? Here's what each port does on your TV, and which devices you should connect to where
  4. 4
    Millions of smartphone users could be at risk from the SMS sign-in URL issue - here's what you need to look out for
  5. 5
    It's official – EVs just outsold gas-powered cars for the first time in Europe, here are 3 reasons why

TechRadar is part of Future US Inc, an international media group and leading digital publisher. Visit our corporate site.

Add as a preferred source on Google
  • About Us
  • Contact Future's experts
  • Contact Us
  • Terms and conditions
  • Privacy policy
  • Cookies policy
  • Advertise with us
  • Web notifications
  • Accessibility Statement
  • Careers

© Future US, Inc. Full 7th Floor, 130 West 42nd Street, New York, NY 10036.

Please login or signup to comment

Please wait...