SlideShare a Scribd company logo
1 of 14
Risks and Benefits of Bringing
Your Own Device
1
What is BYOD?
The policy Bring Your Own Device (BYOD) permits
employees to use their own technical devices such as
tablets, laptops, and mobile phones in the workplace.
2
Risks and Concerns
3
Security
• Security issues are risks of
BYOD policies because
confidential information can
easily be compromised when a
device is lost or stolen.
• If an employee is
terminated, retrieving
company data can be
complicated since work
related data belongs to the
company while the device
belongs to the former
employee.
4
Security
• Downloading mobile apps and
moving data across different
networks and devices makes
company and corporate data
vulnerable to leaks and
attacks.
• Depending on the type of
business and industry you
work in, strict regulatory
compliance mandates has to
be followed if employees use
their own devices. 5
Benefits
6
Higher Efficiency
• Rather than depend on
company computers and
software to get work
done, work can be done
remotely and away from the
office.
• Integrating professional and
personal lives is easier and
allows greater flexibility to
the employee if personal
devices are allowed at work.
7
Productivity Gains
• According to a study
released by Cisco’s
Internet Business
Solutions Group, BYOD
employees are gaining a
global average of 37
minutes of productive
time per week, ranging
from 81 minutes of
productive time per week
in the US to 4 minutes of
productive time in
Germany.
8
Lower Costs to Company
• According to Cisco, companies can save as much as $3,150
annually per employee if they implement a “Comprehensive
BYOD,” which is a more strategic BYOD approach that offers
greater value
• A German employee with an average yearly salary of $45,000
will achieve $75 in additional productivity for companies
while Americans claimed an extra $1,518 if BYOD plans were
implemented
9
Solutions
10
Password Protect and Wipe
Data Clean
• Enforce strong passcodes and
require PIN numbers to ensure
that employees are
acknowledging responsibility
for protecting company data.
• Wipe a device clean if a
device is lost or stolen
11
Limit Mobile Apps
• Rather than ban the use of
mobile apps, companies
should educate their
employees about the risks
third party applications place
on company information.
• Use a Mobile Application
Management (MAM) system
to allow IT to
manage, develop, and control
in-house and third party apps
within the corporate
infrastructure.
12
Conclusion
• Although implementing BYOD policies in the workplace has its
risks and benefits, the best way to minimize risks and
maximize rewards is to implement a clear, defined policy that
is in the best interest for the company and its employees.
13
Choose Cooper
Technologies, Inc!
• For driven IT management services and solutions, choose
Cooper Technologies, Inc. for technological solutions designed
to solve problems efficiently. Visit our website
http://coopertechnologies.net/ to learn more about our
services!
14

More Related Content

What's hot

Traditional shopping vs online shopping
Traditional shopping vs online shopping Traditional shopping vs online shopping
Traditional shopping vs online shopping Syaff Hk
 
The smartphone addiction
The smartphone addictionThe smartphone addiction
The smartphone addictionDilek Göymen
 
Chapter 1 (e business)
Chapter 1 (e business)Chapter 1 (e business)
Chapter 1 (e business)RajThakuri
 
e commerce security and fraud protection
e commerce security and fraud protectione commerce security and fraud protection
e commerce security and fraud protectiontumetr1
 
E commerce vs E business
E commerce vs E businessE commerce vs E business
E commerce vs E businessAnik Faisal
 
Everything about Cell Phone Micro Soldering Parts with Mobilesentrix
Everything about Cell Phone Micro Soldering Parts with MobilesentrixEverything about Cell Phone Micro Soldering Parts with Mobilesentrix
Everything about Cell Phone Micro Soldering Parts with MobilesentrixMobile Sentrix
 
Fraud in Ecommerce
Fraud in EcommerceFraud in Ecommerce
Fraud in EcommerceMartyn Sukys
 
Changing scenario marketing
Changing scenario marketingChanging scenario marketing
Changing scenario marketingbotla
 
14326342 E Commerce
14326342 E Commerce14326342 E Commerce
14326342 E CommerceRISHI RANAUT
 

What's hot (20)

MOBILE COMMERCE
MOBILE COMMERCEMOBILE COMMERCE
MOBILE COMMERCE
 
Xiaomi Inc.
Xiaomi Inc.Xiaomi Inc.
Xiaomi Inc.
 
E - Business Introduction
E - Business IntroductionE - Business Introduction
E - Business Introduction
 
Traditional shopping vs online shopping
Traditional shopping vs online shopping Traditional shopping vs online shopping
Traditional shopping vs online shopping
 
The smartphone addiction
The smartphone addictionThe smartphone addiction
The smartphone addiction
 
Chapter 1 (e business)
Chapter 1 (e business)Chapter 1 (e business)
Chapter 1 (e business)
 
Smart Phone Addiction
Smart Phone AddictionSmart Phone Addiction
Smart Phone Addiction
 
E retailing
E retailingE retailing
E retailing
 
e commerce security and fraud protection
e commerce security and fraud protectione commerce security and fraud protection
e commerce security and fraud protection
 
M Commerce
M CommerceM Commerce
M Commerce
 
E commerce vs E business
E commerce vs E businessE commerce vs E business
E commerce vs E business
 
Everything about Cell Phone Micro Soldering Parts with Mobilesentrix
Everything about Cell Phone Micro Soldering Parts with MobilesentrixEverything about Cell Phone Micro Soldering Parts with Mobilesentrix
Everything about Cell Phone Micro Soldering Parts with Mobilesentrix
 
Fraud in Ecommerce
Fraud in EcommerceFraud in Ecommerce
Fraud in Ecommerce
 
Internet banking
Internet bankingInternet banking
Internet banking
 
Xiaomi
XiaomiXiaomi
Xiaomi
 
Changing scenario marketing
Changing scenario marketingChanging scenario marketing
Changing scenario marketing
 
Ecash ppt
Ecash pptEcash ppt
Ecash ppt
 
E business
E businessE business
E business
 
14326342 E Commerce
14326342 E Commerce14326342 E Commerce
14326342 E Commerce
 
E business
E businessE business
E business
 

Similar to Risks and Benefits of BYOD Devices

PACE-IT, Security+ 4.2: Mobile Security Concepts and Technologies (part 2)
PACE-IT, Security+ 4.2: Mobile Security Concepts and Technologies (part 2)PACE-IT, Security+ 4.2: Mobile Security Concepts and Technologies (part 2)
PACE-IT, Security+ 4.2: Mobile Security Concepts and Technologies (part 2)Pace IT at Edmonds Community College
 
The Accidental Cloud: Privacy and Security Issues in a BYOD World
The Accidental Cloud: Privacy and Security Issues in a BYOD WorldThe Accidental Cloud: Privacy and Security Issues in a BYOD World
The Accidental Cloud: Privacy and Security Issues in a BYOD Worldmkeane
 
BYOD- A Productivity Catalyst
BYOD- A Productivity CatalystBYOD- A Productivity Catalyst
BYOD- A Productivity CatalystPacket One
 
Lock it or Lose It: Why Every Company Should be Concerned About Data Security
Lock it or Lose It: Why Every Company Should be Concerned About Data SecurityLock it or Lose It: Why Every Company Should be Concerned About Data Security
Lock it or Lose It: Why Every Company Should be Concerned About Data SecuritySmartCompliance
 
Ten Commandments of BYOD
Ten Commandments of BYODTen Commandments of BYOD
Ten Commandments of BYODK Singh
 
BYOD Security
BYOD SecurityBYOD Security
BYOD SecurityHexnode
 
Smarter Commerce Summit - IBM MobileFirst Services
Smarter Commerce Summit - IBM MobileFirst ServicesSmarter Commerce Summit - IBM MobileFirst Services
Smarter Commerce Summit - IBM MobileFirst ServicesChris Pepin
 
Best practices for mobile enterprise security and the importance of endpoint ...
Best practices for mobile enterprise security and the importance of endpoint ...Best practices for mobile enterprise security and the importance of endpoint ...
Best practices for mobile enterprise security and the importance of endpoint ...Chris Pepin
 
How To Do BYOD Right
How To Do BYOD RightHow To Do BYOD Right
How To Do BYOD RightRapidScale
 
Aisha visram presentacion bmobilew 2015 rev 2
Aisha visram presentacion bmobilew 2015 rev 2Aisha visram presentacion bmobilew 2015 rev 2
Aisha visram presentacion bmobilew 2015 rev 2Aisha Visram
 
How can EMM help with GDPR compliance?
How can EMM help with GDPR compliance?How can EMM help with GDPR compliance?
How can EMM help with GDPR compliance?Miradore
 
BYOD: Six Essentials for Success
BYOD: Six Essentials for SuccessBYOD: Six Essentials for Success
BYOD: Six Essentials for SuccessDMIMarketing
 
Pete Wassell (Augmate Corportation) Security in the Enterprise Smart Glasses
Pete Wassell (Augmate Corportation) Security in the Enterprise Smart GlassesPete Wassell (Augmate Corportation) Security in the Enterprise Smart Glasses
Pete Wassell (Augmate Corportation) Security in the Enterprise Smart GlassesAugmentedWorldExpo
 
En msft-scrty-cntnt-e book-protectyourdata
En msft-scrty-cntnt-e book-protectyourdataEn msft-scrty-cntnt-e book-protectyourdata
En msft-scrty-cntnt-e book-protectyourdataOnline Business
 

Similar to Risks and Benefits of BYOD Devices (20)

Byod
ByodByod
Byod
 
PACE-IT, Security+ 4.2: Mobile Security Concepts and Technologies (part 2)
PACE-IT, Security+ 4.2: Mobile Security Concepts and Technologies (part 2)PACE-IT, Security+ 4.2: Mobile Security Concepts and Technologies (part 2)
PACE-IT, Security+ 4.2: Mobile Security Concepts and Technologies (part 2)
 
ACT 2014 Business or Pleasure the Challenges of Bring Your Own Device Policie...
ACT 2014 Business or Pleasure the Challenges of Bring Your Own Device Policie...ACT 2014 Business or Pleasure the Challenges of Bring Your Own Device Policie...
ACT 2014 Business or Pleasure the Challenges of Bring Your Own Device Policie...
 
The Accidental Cloud: Privacy and Security Issues in a BYOD World
The Accidental Cloud: Privacy and Security Issues in a BYOD WorldThe Accidental Cloud: Privacy and Security Issues in a BYOD World
The Accidental Cloud: Privacy and Security Issues in a BYOD World
 
BYOD
BYODBYOD
BYOD
 
BYOD- A Productivity Catalyst
BYOD- A Productivity CatalystBYOD- A Productivity Catalyst
BYOD- A Productivity Catalyst
 
Lock it or Lose It: Why Every Company Should be Concerned About Data Security
Lock it or Lose It: Why Every Company Should be Concerned About Data SecurityLock it or Lose It: Why Every Company Should be Concerned About Data Security
Lock it or Lose It: Why Every Company Should be Concerned About Data Security
 
Ten Commandments of BYOD
Ten Commandments of BYODTen Commandments of BYOD
Ten Commandments of BYOD
 
BYOD Security
BYOD SecurityBYOD Security
BYOD Security
 
How to Do BYOD Right
How to Do BYOD RightHow to Do BYOD Right
How to Do BYOD Right
 
Smarter Commerce Summit - IBM MobileFirst Services
Smarter Commerce Summit - IBM MobileFirst ServicesSmarter Commerce Summit - IBM MobileFirst Services
Smarter Commerce Summit - IBM MobileFirst Services
 
Best practices for mobile enterprise security and the importance of endpoint ...
Best practices for mobile enterprise security and the importance of endpoint ...Best practices for mobile enterprise security and the importance of endpoint ...
Best practices for mobile enterprise security and the importance of endpoint ...
 
How To Do BYOD Right
How To Do BYOD RightHow To Do BYOD Right
How To Do BYOD Right
 
Term assignment
Term assignmentTerm assignment
Term assignment
 
Aisha visram presentacion bmobilew 2015 rev 2
Aisha visram presentacion bmobilew 2015 rev 2Aisha visram presentacion bmobilew 2015 rev 2
Aisha visram presentacion bmobilew 2015 rev 2
 
How can EMM help with GDPR compliance?
How can EMM help with GDPR compliance?How can EMM help with GDPR compliance?
How can EMM help with GDPR compliance?
 
BYOD: Six Essentials for Success
BYOD: Six Essentials for SuccessBYOD: Six Essentials for Success
BYOD: Six Essentials for Success
 
Pete Wassell (Augmate Corportation) Security in the Enterprise Smart Glasses
Pete Wassell (Augmate Corportation) Security in the Enterprise Smart GlassesPete Wassell (Augmate Corportation) Security in the Enterprise Smart Glasses
Pete Wassell (Augmate Corportation) Security in the Enterprise Smart Glasses
 
En msft-scrty-cntnt-e book-protectyourdata
En msft-scrty-cntnt-e book-protectyourdataEn msft-scrty-cntnt-e book-protectyourdata
En msft-scrty-cntnt-e book-protectyourdata
 
Portable Biometrics (1)
Portable Biometrics (1)Portable Biometrics (1)
Portable Biometrics (1)
 

Recently uploaded

Future Of Sample Report 2024 | Redacted Version
Future Of Sample Report 2024 | Redacted VersionFuture Of Sample Report 2024 | Redacted Version
Future Of Sample Report 2024 | Redacted VersionMintel Group
 
Contemporary Economic Issues Facing the Filipino Entrepreneur (1).pptx
Contemporary Economic Issues Facing the Filipino Entrepreneur (1).pptxContemporary Economic Issues Facing the Filipino Entrepreneur (1).pptx
Contemporary Economic Issues Facing the Filipino Entrepreneur (1).pptxMarkAnthonyAurellano
 
Islamabad Escorts | Call 03070433345 | Escort Service in Islamabad
Islamabad Escorts | Call 03070433345 | Escort Service in IslamabadIslamabad Escorts | Call 03070433345 | Escort Service in Islamabad
Islamabad Escorts | Call 03070433345 | Escort Service in IslamabadAyesha Khan
 
8447779800, Low rate Call girls in New Ashok Nagar Delhi NCR
8447779800, Low rate Call girls in New Ashok Nagar Delhi NCR8447779800, Low rate Call girls in New Ashok Nagar Delhi NCR
8447779800, Low rate Call girls in New Ashok Nagar Delhi NCRashishs7044
 
Digital Transformation in the PLM domain - distrib.pdf
Digital Transformation in the PLM domain - distrib.pdfDigital Transformation in the PLM domain - distrib.pdf
Digital Transformation in the PLM domain - distrib.pdfJos Voskuil
 
APRIL2024_UKRAINE_xml_0000000000000 .pdf
APRIL2024_UKRAINE_xml_0000000000000 .pdfAPRIL2024_UKRAINE_xml_0000000000000 .pdf
APRIL2024_UKRAINE_xml_0000000000000 .pdfRbc Rbcua
 
Pitch Deck Teardown: Geodesic.Life's $500k Pre-seed deck
Pitch Deck Teardown: Geodesic.Life's $500k Pre-seed deckPitch Deck Teardown: Geodesic.Life's $500k Pre-seed deck
Pitch Deck Teardown: Geodesic.Life's $500k Pre-seed deckHajeJanKamps
 
IoT Insurance Observatory: summary 2024
IoT Insurance Observatory:  summary 2024IoT Insurance Observatory:  summary 2024
IoT Insurance Observatory: summary 2024Matteo Carbone
 
8447779800, Low rate Call girls in Kotla Mubarakpur Delhi NCR
8447779800, Low rate Call girls in Kotla Mubarakpur Delhi NCR8447779800, Low rate Call girls in Kotla Mubarakpur Delhi NCR
8447779800, Low rate Call girls in Kotla Mubarakpur Delhi NCRashishs7044
 
Global Scenario On Sustainable and Resilient Coconut Industry by Dr. Jelfina...
Global Scenario On Sustainable  and Resilient Coconut Industry by Dr. Jelfina...Global Scenario On Sustainable  and Resilient Coconut Industry by Dr. Jelfina...
Global Scenario On Sustainable and Resilient Coconut Industry by Dr. Jelfina...ictsugar
 
Intro to BCG's Carbon Emissions Benchmark_vF.pdf
Intro to BCG's Carbon Emissions Benchmark_vF.pdfIntro to BCG's Carbon Emissions Benchmark_vF.pdf
Intro to BCG's Carbon Emissions Benchmark_vF.pdfpollardmorgan
 
FULL ENJOY Call girls in Paharganj Delhi | 8377087607
FULL ENJOY Call girls in Paharganj Delhi | 8377087607FULL ENJOY Call girls in Paharganj Delhi | 8377087607
FULL ENJOY Call girls in Paharganj Delhi | 8377087607dollysharma2066
 
Kenya’s Coconut Value Chain by Gatsby Africa
Kenya’s Coconut Value Chain by Gatsby AfricaKenya’s Coconut Value Chain by Gatsby Africa
Kenya’s Coconut Value Chain by Gatsby Africaictsugar
 
Innovation Conference 5th March 2024.pdf
Innovation Conference 5th March 2024.pdfInnovation Conference 5th March 2024.pdf
Innovation Conference 5th March 2024.pdfrichard876048
 
MAHA Global and IPR: Do Actions Speak Louder Than Words?
MAHA Global and IPR: Do Actions Speak Louder Than Words?MAHA Global and IPR: Do Actions Speak Louder Than Words?
MAHA Global and IPR: Do Actions Speak Louder Than Words?Olivia Kresic
 
(Best) ENJOY Call Girls in Faridabad Ex | 8377087607
(Best) ENJOY Call Girls in Faridabad Ex | 8377087607(Best) ENJOY Call Girls in Faridabad Ex | 8377087607
(Best) ENJOY Call Girls in Faridabad Ex | 8377087607dollysharma2066
 
Call Us 📲8800102216📞 Call Girls In DLF City Gurgaon
Call Us 📲8800102216📞 Call Girls In DLF City GurgaonCall Us 📲8800102216📞 Call Girls In DLF City Gurgaon
Call Us 📲8800102216📞 Call Girls In DLF City Gurgaoncallgirls2057
 

Recently uploaded (20)

Future Of Sample Report 2024 | Redacted Version
Future Of Sample Report 2024 | Redacted VersionFuture Of Sample Report 2024 | Redacted Version
Future Of Sample Report 2024 | Redacted Version
 
No-1 Call Girls In Goa 93193 VIP 73153 Escort service In North Goa Panaji, Ca...
No-1 Call Girls In Goa 93193 VIP 73153 Escort service In North Goa Panaji, Ca...No-1 Call Girls In Goa 93193 VIP 73153 Escort service In North Goa Panaji, Ca...
No-1 Call Girls In Goa 93193 VIP 73153 Escort service In North Goa Panaji, Ca...
 
Enjoy ➥8448380779▻ Call Girls In Sector 18 Noida Escorts Delhi NCR
Enjoy ➥8448380779▻ Call Girls In Sector 18 Noida Escorts Delhi NCREnjoy ➥8448380779▻ Call Girls In Sector 18 Noida Escorts Delhi NCR
Enjoy ➥8448380779▻ Call Girls In Sector 18 Noida Escorts Delhi NCR
 
Contemporary Economic Issues Facing the Filipino Entrepreneur (1).pptx
Contemporary Economic Issues Facing the Filipino Entrepreneur (1).pptxContemporary Economic Issues Facing the Filipino Entrepreneur (1).pptx
Contemporary Economic Issues Facing the Filipino Entrepreneur (1).pptx
 
Islamabad Escorts | Call 03070433345 | Escort Service in Islamabad
Islamabad Escorts | Call 03070433345 | Escort Service in IslamabadIslamabad Escorts | Call 03070433345 | Escort Service in Islamabad
Islamabad Escorts | Call 03070433345 | Escort Service in Islamabad
 
8447779800, Low rate Call girls in New Ashok Nagar Delhi NCR
8447779800, Low rate Call girls in New Ashok Nagar Delhi NCR8447779800, Low rate Call girls in New Ashok Nagar Delhi NCR
8447779800, Low rate Call girls in New Ashok Nagar Delhi NCR
 
Digital Transformation in the PLM domain - distrib.pdf
Digital Transformation in the PLM domain - distrib.pdfDigital Transformation in the PLM domain - distrib.pdf
Digital Transformation in the PLM domain - distrib.pdf
 
APRIL2024_UKRAINE_xml_0000000000000 .pdf
APRIL2024_UKRAINE_xml_0000000000000 .pdfAPRIL2024_UKRAINE_xml_0000000000000 .pdf
APRIL2024_UKRAINE_xml_0000000000000 .pdf
 
Pitch Deck Teardown: Geodesic.Life's $500k Pre-seed deck
Pitch Deck Teardown: Geodesic.Life's $500k Pre-seed deckPitch Deck Teardown: Geodesic.Life's $500k Pre-seed deck
Pitch Deck Teardown: Geodesic.Life's $500k Pre-seed deck
 
IoT Insurance Observatory: summary 2024
IoT Insurance Observatory:  summary 2024IoT Insurance Observatory:  summary 2024
IoT Insurance Observatory: summary 2024
 
8447779800, Low rate Call girls in Kotla Mubarakpur Delhi NCR
8447779800, Low rate Call girls in Kotla Mubarakpur Delhi NCR8447779800, Low rate Call girls in Kotla Mubarakpur Delhi NCR
8447779800, Low rate Call girls in Kotla Mubarakpur Delhi NCR
 
Global Scenario On Sustainable and Resilient Coconut Industry by Dr. Jelfina...
Global Scenario On Sustainable  and Resilient Coconut Industry by Dr. Jelfina...Global Scenario On Sustainable  and Resilient Coconut Industry by Dr. Jelfina...
Global Scenario On Sustainable and Resilient Coconut Industry by Dr. Jelfina...
 
Intro to BCG's Carbon Emissions Benchmark_vF.pdf
Intro to BCG's Carbon Emissions Benchmark_vF.pdfIntro to BCG's Carbon Emissions Benchmark_vF.pdf
Intro to BCG's Carbon Emissions Benchmark_vF.pdf
 
FULL ENJOY Call girls in Paharganj Delhi | 8377087607
FULL ENJOY Call girls in Paharganj Delhi | 8377087607FULL ENJOY Call girls in Paharganj Delhi | 8377087607
FULL ENJOY Call girls in Paharganj Delhi | 8377087607
 
Japan IT Week 2024 Brochure by 47Billion (English)
Japan IT Week 2024 Brochure by 47Billion (English)Japan IT Week 2024 Brochure by 47Billion (English)
Japan IT Week 2024 Brochure by 47Billion (English)
 
Kenya’s Coconut Value Chain by Gatsby Africa
Kenya’s Coconut Value Chain by Gatsby AfricaKenya’s Coconut Value Chain by Gatsby Africa
Kenya’s Coconut Value Chain by Gatsby Africa
 
Innovation Conference 5th March 2024.pdf
Innovation Conference 5th March 2024.pdfInnovation Conference 5th March 2024.pdf
Innovation Conference 5th March 2024.pdf
 
MAHA Global and IPR: Do Actions Speak Louder Than Words?
MAHA Global and IPR: Do Actions Speak Louder Than Words?MAHA Global and IPR: Do Actions Speak Louder Than Words?
MAHA Global and IPR: Do Actions Speak Louder Than Words?
 
(Best) ENJOY Call Girls in Faridabad Ex | 8377087607
(Best) ENJOY Call Girls in Faridabad Ex | 8377087607(Best) ENJOY Call Girls in Faridabad Ex | 8377087607
(Best) ENJOY Call Girls in Faridabad Ex | 8377087607
 
Call Us 📲8800102216📞 Call Girls In DLF City Gurgaon
Call Us 📲8800102216📞 Call Girls In DLF City GurgaonCall Us 📲8800102216📞 Call Girls In DLF City Gurgaon
Call Us 📲8800102216📞 Call Girls In DLF City Gurgaon
 

Risks and Benefits of BYOD Devices

  • 1. Risks and Benefits of Bringing Your Own Device 1
  • 2. What is BYOD? The policy Bring Your Own Device (BYOD) permits employees to use their own technical devices such as tablets, laptops, and mobile phones in the workplace. 2
  • 4. Security • Security issues are risks of BYOD policies because confidential information can easily be compromised when a device is lost or stolen. • If an employee is terminated, retrieving company data can be complicated since work related data belongs to the company while the device belongs to the former employee. 4
  • 5. Security • Downloading mobile apps and moving data across different networks and devices makes company and corporate data vulnerable to leaks and attacks. • Depending on the type of business and industry you work in, strict regulatory compliance mandates has to be followed if employees use their own devices. 5
  • 7. Higher Efficiency • Rather than depend on company computers and software to get work done, work can be done remotely and away from the office. • Integrating professional and personal lives is easier and allows greater flexibility to the employee if personal devices are allowed at work. 7
  • 8. Productivity Gains • According to a study released by Cisco’s Internet Business Solutions Group, BYOD employees are gaining a global average of 37 minutes of productive time per week, ranging from 81 minutes of productive time per week in the US to 4 minutes of productive time in Germany. 8
  • 9. Lower Costs to Company • According to Cisco, companies can save as much as $3,150 annually per employee if they implement a “Comprehensive BYOD,” which is a more strategic BYOD approach that offers greater value • A German employee with an average yearly salary of $45,000 will achieve $75 in additional productivity for companies while Americans claimed an extra $1,518 if BYOD plans were implemented 9
  • 11. Password Protect and Wipe Data Clean • Enforce strong passcodes and require PIN numbers to ensure that employees are acknowledging responsibility for protecting company data. • Wipe a device clean if a device is lost or stolen 11
  • 12. Limit Mobile Apps • Rather than ban the use of mobile apps, companies should educate their employees about the risks third party applications place on company information. • Use a Mobile Application Management (MAM) system to allow IT to manage, develop, and control in-house and third party apps within the corporate infrastructure. 12
  • 13. Conclusion • Although implementing BYOD policies in the workplace has its risks and benefits, the best way to minimize risks and maximize rewards is to implement a clear, defined policy that is in the best interest for the company and its employees. 13
  • 14. Choose Cooper Technologies, Inc! • For driven IT management services and solutions, choose Cooper Technologies, Inc. for technological solutions designed to solve problems efficiently. Visit our website http://coopertechnologies.net/ to learn more about our services! 14