Skip to main content
Tech Radar Tech Radar Pro Tech Radar Gaming
TechRadar TechRadar the business technology experts
Asia
flag of Singapore
Singapore
Europe
flag of Danmark
Danmark
flag of Suomi
Suomi
flag of Norge
Norge
flag of Sverige
Sverige
flag of UK
UK
flag of Italia
Italia
flag of Nederland
Nederland
flag of België (Nederlands)
België (Nederlands)
flag of France
France
flag of Deutschland
Deutschland
flag of España
España
North America
flag of US (English)
US (English)
flag of Canada
Canada
flag of México
México
Australasia
flag of Australia
Australia
flag of New Zealand
New Zealand
RSS
Sign in
  • View Profile
  • Sign out
Trending
  • Best web hosting
  • Best office chairs
  • Best website builder
  • Best antivirus
  • Expert Insights
Don't miss these
Woman on a phone call in the office
Pro Company owned smartphones or BYOD? What you need to know
Mobile Security
Pro BYOD in the hybrid era: rethinking “bring your own device” policies for a secure, flexible workplace
Users display warnings about the use of artificial intelligence (AI), access to malicious software or threats to online hackers. computer cyber security Warning concept or tech scam.
Pro You wouldn’t skip handwashing – so why skip mobile security hygiene?
Phishing, E-Mail, Network Security, Computer Hacker, Cloud Computing Cyber Security 3d Illustration
Pro Guarding against burnout and breaches with more minimalist and privacy focused phones
Close-up shot of a woman using mobile device with Two-Factor Authentication (2FA) security while logging in securely to her laptop.
Pro How to choose an MDM solution
Person using laptop and phone
Software & Services Best MDM solution of 2025
Business people looking at a laptop screen together.
Pro World Productivity Day reminder: tech adoption isn’t just a strategy – it’s growth
A padlock image floating over a smartphone.
Pro I am the CEO of an endpoint management firm, and it's baffling how often governments overlook unsecured devices
AI writer
Pro AI is already working for your people - now it’s time to make it work for the business
Hands typing on a keyboard surrounded by security icons
Pro How AI is finally erasing the security vs. experience tradeoff that has plagued enterprise IT for decades
IT
Pro The evolution of smart data capture
Office software
Pro How to choose an onboarding software
An AI face in profile against a digital background.
Pro Navigating the rise of Shadow AI in project-based businesses
ai distillation
Pro Tackling Shadow AI: how UK businesses can mitigate the risks
A stylized depiction of a padlocked WiFi symbol sitting in the centre of an interlocking vault.
Pro A spy among us: rethinking cybersecurity in a hybrid world
  1. Pro
  2. Security

What is BYOD and why is it important?

News
By Dean Evans last updated 2 January 2020

Using your own devices at work can be a game-changer.

When you purchase through links on our site, we may earn an affiliate commission. Here’s how it works.

Introduction

Introduction

As many IT departments struggle to keep up with yearly technology changes, company employees increasingly want to use their own devices to access corporate data.

It's part of a growing trend dubbed Bring Your Own Device (BYOD), which encompasses similar Bring Your Own Technology (BYOT), Bring Your Own Phone (BYOP) and Bring Your Own PC (BYOPC) initiatives. All of them have evolved to empower workforces through the so-called 'consumerisation of IT'.

As part of this consumerisation, BYOD encourages company employees to work on the device they choose - accessing corporate email, viewing text documents and much more. The goal for SMBs? Increased productivity and reduced costs.

But BYOD also has a darker side. If not fully understood and regulated, it can threaten IT security and put a company's sensitive business systems at risk.

Page 1 of 6
Page 1 of 6
Why BYOD matters

Why BYOD matters

The driving force behind BYOD is a new IT self-sufficiency among company employees who already own and use personal laptops, tablets and smartphones.

These mobile devices are often newer and more advanced than the equipment deployed by many IT departments. It's hardly surprising that the rapid adoption of lightweight Ultrabooks, iPads and large-screened phones are changing the way that people want to work.

IT departments are playing catch up and could easily refuse to embrace the BYOD idea. Surely it's simpler to provide approved hardware and software applications so you can retain full control over them?

But Richard Absalom, an analyst at Ovum, believes that BYOD will happen whether a company plans for it or not. He says: "Trying to stand in the path of consumerised mobility is likely to be a damaging and futile exercise." The best thing that an SMB or enterprise can do is be aware of the benefits and understand the risks.

Page 2 of 6
Page 2 of 6
BYOD benefits and advantages

BYOD benefits and advantages

There are some key advantages to operating a BYOD strategy, including increased employee satisfaction (they can work more flexibly), cost savings (reduced hardware spend, software licensing and device maintenance) plus productivity gains (employees are happier, more comfortable and often work faster with their own technology).

As Mark Coates, EMEA VP at Good Technology, points out: "By enabling employees to securely and easily access corporate data on their own device, productivity levels will naturally increase. In terms of cost savings, there are huge benefits, since SMBs will not have to manage and fund a second device for employees."

Shaun Smith, technology practice director at Xceed Group, agrees. "At Xceed Group, allowing the use of consumer devices has helped improve both productivity and staff motivation," he says. But he also strikes a note of caution. "For a company to decide if a BYOD strategy would work for them they need to ensure due diligence is conducted - simply evaluating the benefits versus risks."

Page 3 of 6
Page 3 of 6
BYOD risks and disadvantages

BYOD risks and disadvantages

While BYOD sounds attractive, businesses need to consider the full implications of allowing corporate data to be accessed on personal devices that they could have little or no control over. What data can employees have access to? What security measures are in place if an employee's device is lost, stolen or compromised?

This is where convenience clashes with security. "Security and the loss of devices with limited password protection is naturally a key concern," adds Smith. "Increased consumerisation in the workplace can bring with it an increased risk from threats such as hackers and viruses."

There might also be cost implications. Even though IT hardware spend can potentially be reduced with a BYOD approach, it may cost more for a company to integrate and support a diverse range of employee devices. As Coates points out: "Android devices can be complex to manage as there are just so many different flavours - a huge variety of devices and a number of different versions of the operating system."

By far the biggest risk is not having any sort of BYOD policy in place. "Businesses need to recognise the importance of taking action," says Smith. "After all, by ignoring the problem they may unwittingly expose themselves to attack and, as a result, legislative or reputational threats."

Page 4 of 6
Page 4 of 6
Planning a BYOD policy

Planning a BYOD policy

The advent of BYOD is forcing IT departments and IT managers to develop and implement policies that govern the management of unsupported devices. Network security is paramount. Beyond passcode-protecting employee devices, these policies might involve encrypting sensitive data, preventing local storage of corporate documents and/or limiting corporate access to non-sensitive areas.

"The first step for IT managers is to truly understand the problem they are trying to solve," suggests Coates. "And find the solution that matches. In addition to addressing immediate needs, the right solution will be scalable and manageable, and can grow with an organisation as its mobility strategy evolves and changes."

Coates outlines three stages for implementing a BYOD policy, starting with secure device management. "This is the basic functionality of managing devices, both those employee-bought or company-supplied. Let employees work on mobile devices and make sure nothing catastrophic happens. This leads to great improvements in productivity and loyalty.

"However, it's at stages two and three where true mobile productivity and insight comes in, as the focus shifts to mobile applications and data. First by tracking and deploying mobile applications and then establishing mobile collaboration through secure app-to-app workflows, where mobility can be a true catalyst for change."

Page 5 of 6
Page 5 of 6
Implementing a BYOD policy

Implementing a BYOD policy

There are already several key players providing BYOD solutions, ranging from complete sandboxed access through to more lightweight (but user-friendly) solutions, which are policy-driven. The key issue is to guard against data loss or leakage.

Smith has some practical advice for anyone trying to develop a BYOD policy: "Where any device accesses or stores corporate data, a full risk assessment should be carried out against a variety of threats, and appropriate mitigations put in place. This could include anti-malware, encryption, passcodes, remote wipe, preventing jailbreaking, and sandboxing.

An effective BYOD solution will enable you to secure the data, not just the device. With this approach, IT departments need not worry about compromising security in the name of usability.

"All in all, [BYOD] is about being innovative and helping your employees to work better," says Coates. "Employees want to use the devices that they are comfortable with in the workplace. They want to have the same experience at work that they have at home. People are used to using applications now, rather than browser-based solutions. By giving employees what they want, companies will ultimately benefit."

  • Now read: Laptop vs tablet: which is best for a small business?
Page 6 of 6
Page 6 of 6
Dean Evans
Read more
Woman on a phone call in the office
Company owned smartphones or BYOD? What you need to know
 
 
Mobile Security
BYOD in the hybrid era: rethinking “bring your own device” policies for a secure, flexible workplace
 
 
Users display warnings about the use of artificial intelligence (AI), access to malicious software or threats to online hackers. computer cyber security Warning concept or tech scam.
You wouldn’t skip handwashing – so why skip mobile security hygiene?
 
 
Phishing, E-Mail, Network Security, Computer Hacker, Cloud Computing Cyber Security 3d Illustration
Guarding against burnout and breaches with more minimalist and privacy focused phones
 
 
Close-up shot of a woman using mobile device with Two-Factor Authentication (2FA) security while logging in securely to her laptop.
How to choose an MDM solution
 
 
Person using laptop and phone
Best MDM solution of 2025
 
 
Latest in Security
Trojan horse on top of blocks of hexadecimal programming codes. 3D illustration of the concept of online hacking, computer spyware, malware and ransomware.
Chinese malware is flooding GitHub pages - HiddenGh0st, Winos and kkRAT hit devs via SEO poisoning
 
 
Female Programmer Coding on Desktop Computer With Six Displays in Dark Office
CISA blasted by US watchdog for wasting funds and retaining the wrong employees
 
 
Digital Entertainment and Streaming Broadcast Technology Art 3D Render
Researchers uncover huge IPTV piracy network spanning 1,000 domains and 10,000 IP addresses - here's what you need to know
 
 
Manager is verifying the validity, security, approving requests, quality assurance, investment contracts. Online digital document work, paperless office. online survey. Checking mark up on check boxes
It doesn't take a genius to be a cybercriminal - and open source ransomware is making it easier than ever
 
 
Padlock against circuit board/cybersecurity background
Salesforce platforms are being cracked open for data theft - FBI warns of UNC6040 and UNC6395 IOCs
 
 
Phishing, E-Mail, Network Security, Computer Hacker, Cloud Computing Cyber Security 3d Illustration
VSCode market struck by huge influx of malicious WhiteCobra extensions - so be warned
 
 
Latest in News
Ser Duncan the Tall brandishes his sword in A Knight of the Seven Kingdoms
A Knight of the Seven Kingdoms will release in early 2026, HBO boss confirms – and it won't be the only Game of Thrones prequel to arrive next year
 
 
Dyson V8 Cyclone vacuum
"If you change the format, you change a huge amount": Dyson engineer on why the revamped V8 vacuum has an old-school design
 
 
A promotional shot of Battlefield 6.
Battlefield 6 will be better for everyone thanks to the Xbox Series S
 
 
An Amazon teaser showing new Echo and Kindle devices
Amazon teases major hardware launch – here are 5 things to expect, from new Echos to Kindles
 
 
Leonard Shelby holds a polaroid image up to the camera in Memento
I can’t stop rewatching Christopher Nolan’s best movie, and the good news? It’s free to stream
 
 
Someone holding an Xbox controller near a television
I've moved on from Microsoft's Xbox controllers, but this new feature is something I've wanted for years on Windows 11
 
 
LATEST ARTICLES
  1. 1
    A Knight of the Seven Kingdoms will release in early 2026, HBO boss confirms – and it won't be the only Game of Thrones prequel to arrive next year
  2. 2
    I built the perfect ChatGPT prompt to remove streaming choice paralysis — here’s how to try it
  3. 3
    Ending soon! This all-in-one printer from HP can print up to 8000 color pages and is on sale right now
  4. 4
    I have small ears and sensory issues, and I’m delighted we're getting better fit options from our earbuds
  5. 5
    Ultra-thin Linux laptops pack Ryzen AI 9 365 muscle with silky 120Hz displays and room for massive storage and memory

TechRadar is part of Future US Inc, an international media group and leading digital publisher. Visit our corporate site.

  • About Us
  • Contact Future's experts
  • Contact Us
  • Terms and conditions
  • Privacy policy
  • Cookies policy
  • Advertise with us
  • Web notifications
  • Accessibility Statement
  • Careers

© Future US, Inc. Full 7th Floor, 130 West 42nd Street, New York, NY 10036.

Please login or signup to comment

Please wait...