Skip to main content
Become a TechRadar Insider
- Join our community
5
Exclusive perks
24/7
Insider insights
44K+
Active Members
Weekly newsletters
Get daily news, weekly deals and the week’s top tech stories
Commenting access
Join the conversation, share your thoughts and get expert advice
Member badges
Earn badges as you explore news, deals, reviews, guides and more
Exclusive deals
Save on gadgets, subscriptions and accessories with handpicked discounts
Become a TechRadar Insider
Sign up with your email below to instantly access member features, newsletters and exclusive Insider perks
By submitting your information you agree to the Terms & Conditions and Privacy Policy and are aged 16 or over.
FIND OUT ABOUT OUR MAGAZINE
Want to subscribe to the magazine? Click the button below to find out more information.
Find out more
Become a TechRadar Insider now

Sign up with your email below to instantly access member features, newsletters and exclusive Insider perks

By submitting your information you agree to the Terms & Conditions and Privacy Policy and are aged 16 or over.

Background
Welcome to Tech Radar club !
Hi ,

Your membership journey starts here.

Keep exploring and earning more as a member.

MY ACCOUNT

Badge picture
Earn your first badge
Start reading to unlock your first badge
Keep earning badges
Explore ways to get more involved as a member.
Latest in phones

Latest in phones

News, deals, reviews, guides and more…

Start reading
Latest in computing

Latest in computing

News, deals, reviews, guides and more on the newest computing gadgets

Start reading

Your membership perks

Start exploring exclusive deals, expert advice and more

Explore now
Member Exclusives

Member Rewards

Unlock and manage exclusive Techradar member rewards.

See rewards

Sign Out
Tech Radar Tech Radar Pro Tech Radar Gaming
TechRadar TechRadar the business technology experts
SG EditionSingapore
DK EditionDanmark FI EditionSuomi NO EditionNorge SE EditionSverige UK EditionUK IT EditionItalia NL EditionNederland BE (NL) EditionBelgië (Nederlands) FR EditionFrance DE EditionDeutschland ES EditionEspaña
US EditionUS (English) CA EditionCanada MX EditionMéxico
AU EditionAustralia NZ EditionNew Zealand
RSS
Sign in
  • View Profile
  • Sign out
Don't miss these
Asus Zenscreen
Pro Turn any location into an office with ASUS travel routers and portable monitors
iPhone with VPN connection
VPN Services Do I need a VPN on my phone? 7 things you can use a VPN for on your mobile
Canon MAXIFY GX7020 1
Printers & Scanners 5 essential features for small business printers — Check your chosen printer has these if you're printing from the office or home office
Big letters AI in pink in front of pink and blue strands of light suggesting a digital explosion
Pro Why enterprises need governance frameworks for agentic AI
Robots in a data center
Pro AI confidence gap is stalling UK small businesses
A portion of the globe with countries lit up by their lights at night, and with dotted lights criss-crossing the image connecting the countries
Pro FCC router ban begs the question: Do you know what’s running in your network?
TRP Perspectives graphic
Pro Introducing Perspectives — the new home for premium contributed content on TechRadar Pro
A close up of a person's eyes and face. They are wearing glasses and in one eye there's. a reflection of a digital brain
Pro The AI trust advantage: How smarter security wins customer confidence
Caution sign data unlocking hackers. Malicious software, virus and cybercrime, System warning hacked alert, cyberattack on online network, data breach, risk of website
Pro Default BitLocker configuration isn’t enough: Defending endpoints against physical attacks
Two colleagues celebrating a win
Software & Services Best small business software of 2026
A representation of cloud backup and cloud storage overlayed on a person using a laptop.
Pro Best business cloud storage of 2026
A digital grid criss-crossing the lights and buildings of a vast city below
Pro Why 2026 is the year of flexibility without friction: solving the multi-platform crisis
Secure technology. Polygonal wireframe shield with check mark sign on dark blue. Secure service, protect data, cyber shield, antivirus solution, internet safety, firewall system, privacy
Security Microsoft is introducing Entra passkeys to Windows – so tough luck if your device is jailbroken, as your credentials will soon be gone forever
A profile of a human brain against a digital background.
Pro The pilot phase is over. Here’s what’s next for enterprise AI automation
Hands on a laptop with overlaid logos representing network security
Pro It’s time cyber security understood human behavior and acted accordingly
Trending
  • Best office chairs
  • Best 3D printers
  • Best antivirus
  • Best web hosting
  • Best website builder
  1. Pro
  2. Security

What is BYOD and why is it important?

News
By Dean Evans last updated 2 January 2020

Using your own devices at work can be a game-changer.

When you purchase through links on our site, we may earn an affiliate commission. Here’s how it works.

Introduction

Introduction

As many IT departments struggle to keep up with yearly technology changes, company employees increasingly want to use their own devices to access corporate data.

It's part of a growing trend dubbed Bring Your Own Device (BYOD), which encompasses similar Bring Your Own Technology (BYOT), Bring Your Own Phone (BYOP) and Bring Your Own PC (BYOPC) initiatives. All of them have evolved to empower workforces through the so-called 'consumerisation of IT'.

As part of this consumerisation, BYOD encourages company employees to work on the device they choose - accessing corporate email, viewing text documents and much more. The goal for SMBs? Increased productivity and reduced costs.

But BYOD also has a darker side. If not fully understood and regulated, it can threaten IT security and put a company's sensitive business systems at risk.

Page 1 of 6
Page 1 of 6
Why BYOD matters

Why BYOD matters

The driving force behind BYOD is a new IT self-sufficiency among company employees who already own and use personal laptops, tablets and smartphones.

These mobile devices are often newer and more advanced than the equipment deployed by many IT departments. It's hardly surprising that the rapid adoption of lightweight Ultrabooks, iPads and large-screened phones are changing the way that people want to work.

IT departments are playing catch up and could easily refuse to embrace the BYOD idea. Surely it's simpler to provide approved hardware and software applications so you can retain full control over them?

But Richard Absalom, an analyst at Ovum, believes that BYOD will happen whether a company plans for it or not. He says: "Trying to stand in the path of consumerised mobility is likely to be a damaging and futile exercise." The best thing that an SMB or enterprise can do is be aware of the benefits and understand the risks.

Page 2 of 6
Page 2 of 6
BYOD benefits and advantages

BYOD benefits and advantages

There are some key advantages to operating a BYOD strategy, including increased employee satisfaction (they can work more flexibly), cost savings (reduced hardware spend, software licensing and device maintenance) plus productivity gains (employees are happier, more comfortable and often work faster with their own technology).

As Mark Coates, EMEA VP at Good Technology, points out: "By enabling employees to securely and easily access corporate data on their own device, productivity levels will naturally increase. In terms of cost savings, there are huge benefits, since SMBs will not have to manage and fund a second device for employees."

Shaun Smith, technology practice director at Xceed Group, agrees. "At Xceed Group, allowing the use of consumer devices has helped improve both productivity and staff motivation," he says. But he also strikes a note of caution. "For a company to decide if a BYOD strategy would work for them they need to ensure due diligence is conducted - simply evaluating the benefits versus risks."

Page 3 of 6
Page 3 of 6
BYOD risks and disadvantages

BYOD risks and disadvantages

While BYOD sounds attractive, businesses need to consider the full implications of allowing corporate data to be accessed on personal devices that they could have little or no control over. What data can employees have access to? What security measures are in place if an employee's device is lost, stolen or compromised?

This is where convenience clashes with security. "Security and the loss of devices with limited password protection is naturally a key concern," adds Smith. "Increased consumerisation in the workplace can bring with it an increased risk from threats such as hackers and viruses."

There might also be cost implications. Even though IT hardware spend can potentially be reduced with a BYOD approach, it may cost more for a company to integrate and support a diverse range of employee devices. As Coates points out: "Android devices can be complex to manage as there are just so many different flavours - a huge variety of devices and a number of different versions of the operating system."

By far the biggest risk is not having any sort of BYOD policy in place. "Businesses need to recognise the importance of taking action," says Smith. "After all, by ignoring the problem they may unwittingly expose themselves to attack and, as a result, legislative or reputational threats."

Page 4 of 6
Page 4 of 6
Planning a BYOD policy

Planning a BYOD policy

The advent of BYOD is forcing IT departments and IT managers to develop and implement policies that govern the management of unsupported devices. Network security is paramount. Beyond passcode-protecting employee devices, these policies might involve encrypting sensitive data, preventing local storage of corporate documents and/or limiting corporate access to non-sensitive areas.

"The first step for IT managers is to truly understand the problem they are trying to solve," suggests Coates. "And find the solution that matches. In addition to addressing immediate needs, the right solution will be scalable and manageable, and can grow with an organisation as its mobility strategy evolves and changes."

Coates outlines three stages for implementing a BYOD policy, starting with secure device management. "This is the basic functionality of managing devices, both those employee-bought or company-supplied. Let employees work on mobile devices and make sure nothing catastrophic happens. This leads to great improvements in productivity and loyalty.

"However, it's at stages two and three where true mobile productivity and insight comes in, as the focus shifts to mobile applications and data. First by tracking and deploying mobile applications and then establishing mobile collaboration through secure app-to-app workflows, where mobility can be a true catalyst for change."

Page 5 of 6
Page 5 of 6
Implementing a BYOD policy

Implementing a BYOD policy

There are already several key players providing BYOD solutions, ranging from complete sandboxed access through to more lightweight (but user-friendly) solutions, which are policy-driven. The key issue is to guard against data loss or leakage.

Smith has some practical advice for anyone trying to develop a BYOD policy: "Where any device accesses or stores corporate data, a full risk assessment should be carried out against a variety of threats, and appropriate mitigations put in place. This could include anti-malware, encryption, passcodes, remote wipe, preventing jailbreaking, and sandboxing.

An effective BYOD solution will enable you to secure the data, not just the device. With this approach, IT departments need not worry about compromising security in the name of usability.

"All in all, [BYOD] is about being innovative and helping your employees to work better," says Coates. "Employees want to use the devices that they are comfortable with in the workplace. They want to have the same experience at work that they have at home. People are used to using applications now, rather than browser-based solutions. By giving employees what they want, companies will ultimately benefit."

  • Now read: Laptop vs tablet: which is best for a small business?
Page 6 of 6
Page 6 of 6
Dean Evans
  • Facebook
  • X
  • Whatsapp
  • Reddit
  • Pinterest
  • Flipboard
  • Threads
  • Email
Share this article
Join the conversation
Follow us
Add us as a preferred source on Google
Tech Radar Pro
Are you a pro? Subscribe to our newsletter

Sign up to the TechRadar Pro newsletter to get all the top news, opinion, features and guidance your business needs to succeed!


By submitting your information you agree to the Terms & Conditions and Privacy Policy and are aged 16 or over.

You are now subscribed

Your newsletter sign-up was successful


Join the club

Get full access to premium articles, exclusive features and a growing list of member rewards.


An account already exists for this email address, please log in.
Subscribe to our newsletter
Read more
Business man using mobile phone and laptop with global network and technology icons on virtual screen
Pro Why managing mobile devices is a question of optimization as well as security
 
 
A hand reaching out to touch a futuristic rendering of an AI processor.
Pro Your employees are using AI, whether you like it or not - but are they using AI securely?
 
 
Caution sign data unlocking hackers. Malicious software, virus and cybercrime, System warning hacked alert, cyberattack on online network, data breach, risk of website
Pro Default BitLocker configuration isn’t enough: Defending endpoints against physical attacks
 
 
Hands on a laptop with overlaid logos representing network security
Pro It’s time cyber security understood human behavior and acted accordingly
 
 
Group of businesspeople negotiating gathered in modern conference room
Pro The death of the IT department, as we know it
 
 
A pink triangle with a red exclamation mark inside on a blue digital landscape
Pro Solving the shadow IT crisis in travel
 
 
Latest in Security
hacker hands at work with  interface around
Security Dutch cosmetic powerhouse Rituals confirms breach and stolen data from 'My Rituals' membership database
 
 
wo human figure including America and China flag are in confrontation on the world background
Security 'We will be taking action to protect American innovation': White House accuses China of 'systematically' extracting American AI technologies
 
 
A hand about to touch a phone. Superimposed on top of it is a pink triangle with exclamation mark inside it. Behind it is a computer display with code on it
Security CISA puts US government agencies on two-week deadline to patch Microsoft Defender BlueHammer zero-day exploit
 
 
A graphical rendering of the Mozilla Firefox icon.
Security This Firefox vulnerability may have been tracking all your private Tor identities – even in Private Mode
 
 
Abstract image of robots working in an office environment including creating blueprint of robot arm, making a phone call, and typing on a keyboard
Security China-nexus cyber actors' are turning routers and IoT infrastructure into covert botnets 'at scale' – NCSC, Five Eyes, and others warn of campaign involving Typhoon-designated groups
 
 
Malware attack virus alert , malicious software infection , cyber security awareness training to protect business
Security Health data from UK Biobank spotted for sale in China – Government confirms medical info from 500,000 participants involved
 
 
Latest in News
A hand pulling out a CD from a collection next to an iPod resting on a laptop
Tech Nearly half of Gen Z want to live in the past due to modern tech
 
 
Sebastian Sawe celebrates crossing the line first to win the London Marathon 2025, with Buckingham Palace and the Mall in the background.
How to Watch Sport How to watch London Marathon 2026: Free Streams & TV Channels
 
 
Intel Wildcat Lake laptop showing lid in green color
Laptops New Windows 11 laptop looks like a true MacBook Neo rival to worry Apple
 
 
An AI manga panel, Tim Cook, and the new DJI drone's camera
Tech ICYMI: the week's biggest tech news stories for April 25, 2026
 
 
Giant eye watching at man working at the computer. Surveillance, hacking, internet security concept. Flat vector illustration.
VPN Privacy & Security This hidden SIM flaw lets spies track your location, and using a VPN can't help
 
 
Classic Doll Box on shelf
Entertainment “The biggest innovation is actually the box”: Inside Disney’s plastic-free Princess doll redesign
 
 
LATEST ARTICLES
  1. 1
    Quordle hints and answers for Sunday, April 26 (game #1553)
  2. 2
    NYT Connections hints and answers for Sunday, April 26 (game #1050)
  3. 3
    NYT Strands hints and answers for Sunday, April 26 (game #784)
  4. 4
    IKEA is turning 40 — here are 11 of its most iconic designs
  5. 5
    I'm still playing Forza Horizon 3 a decade after release — here's why I can't get enough of its beautiful world

Useful links

  • Best VPN
  • Best Free VPN
  • Best Web Hosting Service
  • Best Website Builder
  • Best Laptops
  • Best Gaming Laptops
  • Best Gaming PC
  • Best PC Gaming Chair
  • Best Phone
  • Best TV
  • Best Oled TVs
  • Best Smartwatch
  • Best Turntables
  • Best Noise Cancelling Headphones
  • Best Wireless Earbuds
  • Best Office Chairs
  • Best Camera
  • Best Dash Cam
  • Best Drones
  • Best Robot Vacuums

TechRadar is part of Future US Inc, an international media group and leading digital publisher. Visit our corporate site.

Add as a preferred source on Google Add as a preferred source on Google
  • About Us
  • Contact Future's experts
  • Contact Us
  • Terms and conditions
  • Privacy policy
  • Cookies policy
  • Advertise with us
  • Web notifications
  • Accessibility Statement
  • Careers

© Future US, Inc. Full 7th Floor, 130 West 42nd Street, New York, NY 10036.

Please login or signup to comment

Please wait...