SlideShare a Scribd company logo
1 of 19
CLIENT LOGO HERE
The Debate Over BYOD
10.16.2012
INTRODUCTION
Eric Alfaro is the Chief Information Officer
of Modis, and Modis’s parent company,
Adecco Group North America.
Adecco Group is the world’s largest
recruitment and workforce solutions
provider. Eric’s team in North America
delivers technology enabled business
solutions and services to over 800 Adecco
locations and 8000 Adecco employees in
North America.
2
AGENDA
• Definition: BYOD
• BYOD – More Than a Trend, It’s a Shift
• Why implement a BYOD strategy?
• Best Practices in a Successful BYOD Program
• Downsides to BYOD and solutions
3
WHAT IS BYOD?
BYOD or Bring Your Own Device is becoming the norm among employees
and employers alike. It refers to the policy of allowing employees to
purchase and integrate their own devices into a corporate operating
environment. The most common devices are laptops, smartphones and
tablets.
While businesses benefit by having up-to-date and connected employees,
IT departments often find it difficult to balance changing technology
landscapes with requirements to manage and support a homogenous
environment.
BYOD also means dealing with new security concerns and a shift to
empowered employee computing.
4
HOW BIG IS BYOD?
• BYOD is a prominent component of the “Consumerization of IT” and
is rapidly changing the way IT delivers services and support.
• Client virtualization products (e.g. Citrix) are mainstream solutions for
securely deploying business applications to multiple end user devices,
and Internet standards (HTML5) mean multi-device support is closer.
• In a 2012 survey of 600 businesses, Cisco found that 95 percent
allowed their employees to BYOD in some form. An example of this
would be secure access to corporate email services from a BYOD,
which is the most common service provided.
• Of those companies, many also provided technical support for the
devices.
• 36% of respondents provided support across all devices and
platforms.
5
Source: 2012 Cisco IBSG Horizons Study
BYOD TOUCHES IT, HR, SOURCING, …
Empowered
Employees
6
Security of Business
Data
User Requirements
and Populations
IT Support
Capabilities
Cost Management
Continuous Mobile
Device Technology
Evolution
HR and Business
Policies
Employee IT
Procurement
HR
Sourcing
Sourcing
THE BENEFITS OF BYOD FOR COMPANIES
7
• BYOD enhances employee productivity. It allows for immediate access
to work when away from the office, during commutes, while traveling,
and during down-time. The costs of delivering a solution should be
measured against increase in employee productivity. Industry reports an
average $300 to $1,300, which would depend on your measurement.
• Employees are much more likely to protect and care for their own
devices. This equates to decreased expenditures due to damaged or
stolen devices and data loss.
• Device ownership costs such as initial set-up, maintenance, insurance,
and data plans are shifted to the employee rather than the employer.
• For Gens Y and Z, 50% are using these technologies at home (and
expecting them in the office).
BENEFITS OF BYOD FOR EMPLOYEES
• Efficiency: Carrying a single device is preferable to carrying
multiple devices.
• An employee’s device can be used for personal purposes so they’ll
be able to save settings and documents on a single phone, laptop,
or tablet.
• Employees can control which devices they want. This allows them
to choose the technology that best suits their needs while also
guaranteeing them the freedom to upgrade and purchase devices
on their own timeline.
IMPLEMENTING – BEST PRACTICES
1. Understand your customers and operating environment
2. Prioritize deployment of BYOD services
3. Make support processes simple and clear
4. Communicate!
9
TECHNOLOGY AND BYOD AT MODIS
• How similar is Modis to your business?
• Our workforce is technology driven and a large segment is comfortable
with minimal technology support – a good starting point for BYOD
services
10
43%
60%
67%
0% 20% 40% 60% 80%
I'm comfortable using technology
with little or no help
I like technology
Technology is important to me
UNDERSTAND YOUR CUSTOMERS AND
OPERATING ENVIRONMENT
• What populations of IT consumers exist in your business?
• Where do they work? How technology savvy are they?
• What applications do they use? What type of data do they
access?
• What does it cost to support them?
• What BYOD capabilities do your IT enterprise management tools
have?
• What corporate policies are relevant?
11
WHERE TO START – WHAT’S HOT WITH YOUR
CUSTOMERS?
• In the Modis environment, Tablets and Phones account for majority of
BYOD devices, which is where our current strategy is focused
• The complexity of desktop applications and security requirements has
made widespread laptop and desktop BYOD too costly
• Consider Tiered services, rather than “One Size Fits All”
• Products like Citrix and
Web delivery methods
are making application
portability more viable
on common computing
devices
12
91%
79%
12%
8%
1%
7%
9%
4%
3%
3%
2%
2%
84%
89%
96%
Desktop
Laptop/Notebook
Smartphone
Standard Mobile
Phone
Tablet
Company Device Ownership
Company Company &Personal Personal
MAKING BYOD WORK: WHAT APPLICATIONS DO
YOUR EMPLOYEES NEED?
• Not all applications work well across all BYOD devices
• Ensure the applications your employees need will meet performance and
ease of use expectations
• Consider starting with basics: Email, Calendar, Web
• Modis workforce relies heavily on
collaboration applications, most
of which run well on mobile,
tablet, and laptop devices
• Now is the time to start planning for
future applications can be used with BYOD
13
51%
53%
54%
59%
96%
99%
0% 20% 40% 60% 80% 100% 120%
Presentations
Web Meetings
Instant Messaging
Social Media
Calendar
Email
PRIORITIZE – LOOK FOR QUICK WINS AND TRAPS
• Consider value vs. cost / effort / risk for different BYOD features
o Trap: Supporting BYOD like traditional internal IT systems
o Check: Most modern solutions include web access. Upgrading an old
application might get you BYOD access out of the box
• Engage your Legal, Risk Management, and Sourcing /
Procurement function(s) for guidance
• Think incrementally as you deploy features
• Test the most widely use device / technologies and VIPs
• Stick to mainstream BYOD-friendly applications if you can
• Expect challenges14
• Get right level of business and management sponsorship for
success
• Make BYOD program clear and align support methods with self-
service tenants
• Include BYOD survey items in your IT satisfaction surveys and IT
cost metrics
• Create employee Evangelist teams with access to news on
“what’s next” to drive demand
15
COMMUNICATE!
DOWNSIDE OF BYOD FOR COMPANIES
16
• Employee owned devices doesn’t translate to no cost for companies
Ensure you consider TCO – total cost of ownership
• Device types change almost daily
Identify essential version and interface requirements
• Sensitive and protected data can pose a security risk
Have this discussion with your Risk, Legal, or Data Protection resource prior to
BYOD implementation
• For IT leaders it’s difficult to explain the time, effort and expense issues
surrounding BYOD to business leaders
If you are already doing IT cost tracking, include BYOD from day one
DOWNSIDE OF BYOD FOR EMPLOYEES
17
• It can be costly to own and maintain a device
 Consider an exception policy for employees who are unable to get a
device, but need one
• It may be necessary to purchase a more expensive data plan to
accommodate the larger volume of communications
 Think through how you’ll break out person vs. company data use
• Employees may have difficulty “disconnecting” and having
downtime
 Work – Life balance is a key satisfaction point for most employees
• When accessing the company’s network an employee may be
unwittingly exposing personal information, passwords and browsing
history
 Acceptable use policy
• In some situations an employee may be forced to relinquish the
device so that it may be cleaned of company data
 Communicate and help VIPs
THE BOTTOM LINE ON BYOD
• Understand what problem(s) you’re solving
• Consider the total cost of BYOD, including a reimbursement policy
• Plan comprehensively; it’s hard to “put the genie back in the bottle”
• Be incremental in your approach to features and services to limit
deployment risk and help users adjust to support
• Communicate!
• Review or update your security incident response processes
18
QUESTIONS ?

More Related Content

What's hot

Risks and Benefits of Bringing Your Own Device
Risks and Benefits of Bringing Your Own Device Risks and Benefits of Bringing Your Own Device
Risks and Benefits of Bringing Your Own Device CooperTechnologiesInc
 
Business Functions & Business Processes in ERP
Business Functions & Business Processes in ERPBusiness Functions & Business Processes in ERP
Business Functions & Business Processes in ERPTom Matys
 
MIS - IT Infrastructure (Part I)
MIS  - IT Infrastructure (Part I)MIS  - IT Infrastructure (Part I)
MIS - IT Infrastructure (Part I)Soetam Rizky
 
Information system
Information systemInformation system
Information systemDhani Ahmad
 
Introduction to the management of information security
Introduction to the management of information security  Introduction to the management of information security
Introduction to the management of information security Sammer Qader
 
Information Technology for Management and Business
Information Technology for Management and BusinessInformation Technology for Management and Business
Information Technology for Management and BusinessGanta Kishore Kumar
 
Information system ethics
Information system ethicsInformation system ethics
Information system ethicsKriscila Yumul
 
Data Center Security
Data Center SecurityData Center Security
Data Center Securitydevalnaik
 
ERP Chapter 1 : Business functions and business processes
ERP Chapter 1 : Business functions and business processesERP Chapter 1 : Business functions and business processes
ERP Chapter 1 : Business functions and business processesRey-an Baricanosa
 
Decision support systems & knowledge management systems
Decision support systems & knowledge management systemsDecision support systems & knowledge management systems
Decision support systems & knowledge management systemsOnline
 
Executive support system (ess)
Executive support system (ess)Executive support system (ess)
Executive support system (ess)Saumya Singh
 
data resource management
 data resource management data resource management
data resource managementsoodsurbhi123
 
5 data resource management
5 data resource management5 data resource management
5 data resource managementNymphea Saraf
 
Issues and challenges in e-business
Issues and challenges in e-businessIssues and challenges in e-business
Issues and challenges in e-businessNishant Pahad
 

What's hot (20)

Risks and Benefits of Bringing Your Own Device
Risks and Benefits of Bringing Your Own Device Risks and Benefits of Bringing Your Own Device
Risks and Benefits of Bringing Your Own Device
 
Business Functions & Business Processes in ERP
Business Functions & Business Processes in ERPBusiness Functions & Business Processes in ERP
Business Functions & Business Processes in ERP
 
Managing the digital firm
Managing the digital firmManaging the digital firm
Managing the digital firm
 
MIS 201 ch1.ppt
MIS 201 ch1.pptMIS 201 ch1.ppt
MIS 201 ch1.ppt
 
MIS - IT Infrastructure (Part I)
MIS  - IT Infrastructure (Part I)MIS  - IT Infrastructure (Part I)
MIS - IT Infrastructure (Part I)
 
Lecture 04 data resource management
Lecture 04 data resource managementLecture 04 data resource management
Lecture 04 data resource management
 
Information system
Information systemInformation system
Information system
 
Introduction to the management of information security
Introduction to the management of information security  Introduction to the management of information security
Introduction to the management of information security
 
Information Technology for Management and Business
Information Technology for Management and BusinessInformation Technology for Management and Business
Information Technology for Management and Business
 
Information system ethics
Information system ethicsInformation system ethics
Information system ethics
 
Data Center Security
Data Center SecurityData Center Security
Data Center Security
 
ERP Chapter 1 : Business functions and business processes
ERP Chapter 1 : Business functions and business processesERP Chapter 1 : Business functions and business processes
ERP Chapter 1 : Business functions and business processes
 
Decision support systems & knowledge management systems
Decision support systems & knowledge management systemsDecision support systems & knowledge management systems
Decision support systems & knowledge management systems
 
Executive support system (ess)
Executive support system (ess)Executive support system (ess)
Executive support system (ess)
 
data resource management
 data resource management data resource management
data resource management
 
e-Business
e-Businesse-Business
e-Business
 
5 data resource management
5 data resource management5 data resource management
5 data resource management
 
Issues and challenges in e-business
Issues and challenges in e-businessIssues and challenges in e-business
Issues and challenges in e-business
 
MIS
MISMIS
MIS
 
Mis structure of digital firm
Mis structure of digital firmMis structure of digital firm
Mis structure of digital firm
 

Viewers also liked

BYOD Presentation for 2015 Year
BYOD Presentation for 2015 YearBYOD Presentation for 2015 Year
BYOD Presentation for 2015 YearSunnyhillsSchool
 
IT Department Trends: Moving Away from Outsourcing
IT Department Trends: Moving Away from OutsourcingIT Department Trends: Moving Away from Outsourcing
IT Department Trends: Moving Away from OutsourcingModis
 
BYOD: Implementation and Security Issues
BYOD: Implementation and Security IssuesBYOD: Implementation and Security Issues
BYOD: Implementation and Security IssuesHarsh Kishore Mishra
 
Modis CEO Survey 2014
Modis CEO Survey 2014Modis CEO Survey 2014
Modis CEO Survey 2014Modis
 
Come affrontare le sfide del BYOD, Bring Your Own Device - Clever News, 01/2013
Come affrontare le sfide del BYOD, Bring Your Own Device - Clever News, 01/2013Come affrontare le sfide del BYOD, Bring Your Own Device - Clever News, 01/2013
Come affrontare le sfide del BYOD, Bring Your Own Device - Clever News, 01/2013Clever Consulting
 
Modis Survey: America's View of Tech
Modis Survey: America's View of TechModis Survey: America's View of Tech
Modis Survey: America's View of TechModis
 
PNSD presentazione a Cagliari
PNSD presentazione a CagliariPNSD presentazione a Cagliari
PNSD presentazione a Cagliaripaolarduini
 
Etude de l’impact des programmes d’égalité des chances portés par HEC et la F...
Etude de l’impact des programmes d’égalité des chances portés par HEC et la F...Etude de l’impact des programmes d’égalité des chances portés par HEC et la F...
Etude de l’impact des programmes d’égalité des chances portés par HEC et la F...HEC Paris
 
Les phénomènes BYOD, BYOC, WYOD, CYOD & COPE
Les phénomènes BYOD, BYOC, WYOD, CYOD & COPELes phénomènes BYOD, BYOC, WYOD, CYOD & COPE
Les phénomènes BYOD, BYOC, WYOD, CYOD & COPEAvocatsMathias
 
Byod par où commencer normand cyr
Byod par où commencer   normand cyrByod par où commencer   normand cyr
Byod par où commencer normand cyrCLDEM
 
Protéger vos données dans un contexte BYOD/Office 365 avec le nouveau service...
Protéger vos données dans un contexte BYOD/Office 365 avec le nouveau service...Protéger vos données dans un contexte BYOD/Office 365 avec le nouveau service...
Protéger vos données dans un contexte BYOD/Office 365 avec le nouveau service...Microsoft Technet France
 
Presentazione PNSD Corso Dirigenti Scolastici
Presentazione PNSD Corso Dirigenti ScolasticiPresentazione PNSD Corso Dirigenti Scolastici
Presentazione PNSD Corso Dirigenti Scolasticirobertomartorana
 
Modis IT Staffing And Talent Management
Modis IT Staffing And Talent ManagementModis IT Staffing And Talent Management
Modis IT Staffing And Talent ManagementModis
 
Introduzione al BYOD
Introduzione al BYODIntroduzione al BYOD
Introduzione al BYODSwitchup srl
 
Corso di Formazione: B.Y.O.D.
Corso di Formazione: B.Y.O.D.Corso di Formazione: B.Y.O.D.
Corso di Formazione: B.Y.O.D.Design Didattico
 

Viewers also liked (20)

BYOD Presentation for 2015 Year
BYOD Presentation for 2015 YearBYOD Presentation for 2015 Year
BYOD Presentation for 2015 Year
 
IT Department Trends: Moving Away from Outsourcing
IT Department Trends: Moving Away from OutsourcingIT Department Trends: Moving Away from Outsourcing
IT Department Trends: Moving Away from Outsourcing
 
BYOD: Implementation and Security Issues
BYOD: Implementation and Security IssuesBYOD: Implementation and Security Issues
BYOD: Implementation and Security Issues
 
09 età di_pericle
09 età di_pericle09 età di_pericle
09 età di_pericle
 
Il pnsd a scuola
Il pnsd a scuolaIl pnsd a scuola
Il pnsd a scuola
 
Modis CEO Survey 2014
Modis CEO Survey 2014Modis CEO Survey 2014
Modis CEO Survey 2014
 
Byod in-a-box
Byod in-a-boxByod in-a-box
Byod in-a-box
 
Come affrontare le sfide del BYOD, Bring Your Own Device - Clever News, 01/2013
Come affrontare le sfide del BYOD, Bring Your Own Device - Clever News, 01/2013Come affrontare le sfide del BYOD, Bring Your Own Device - Clever News, 01/2013
Come affrontare le sfide del BYOD, Bring Your Own Device - Clever News, 01/2013
 
Pnsd azioni
Pnsd azioniPnsd azioni
Pnsd azioni
 
Modis Survey: America's View of Tech
Modis Survey: America's View of TechModis Survey: America's View of Tech
Modis Survey: America's View of Tech
 
PNSD presentazione a Cagliari
PNSD presentazione a CagliariPNSD presentazione a Cagliari
PNSD presentazione a Cagliari
 
Etude de l’impact des programmes d’égalité des chances portés par HEC et la F...
Etude de l’impact des programmes d’égalité des chances portés par HEC et la F...Etude de l’impact des programmes d’égalité des chances portés par HEC et la F...
Etude de l’impact des programmes d’égalité des chances portés par HEC et la F...
 
Les phénomènes BYOD, BYOC, WYOD, CYOD & COPE
Les phénomènes BYOD, BYOC, WYOD, CYOD & COPELes phénomènes BYOD, BYOC, WYOD, CYOD & COPE
Les phénomènes BYOD, BYOC, WYOD, CYOD & COPE
 
BYOD
BYOD BYOD
BYOD
 
Byod par où commencer normand cyr
Byod par où commencer   normand cyrByod par où commencer   normand cyr
Byod par où commencer normand cyr
 
Protéger vos données dans un contexte BYOD/Office 365 avec le nouveau service...
Protéger vos données dans un contexte BYOD/Office 365 avec le nouveau service...Protéger vos données dans un contexte BYOD/Office 365 avec le nouveau service...
Protéger vos données dans un contexte BYOD/Office 365 avec le nouveau service...
 
Presentazione PNSD Corso Dirigenti Scolastici
Presentazione PNSD Corso Dirigenti ScolasticiPresentazione PNSD Corso Dirigenti Scolastici
Presentazione PNSD Corso Dirigenti Scolastici
 
Modis IT Staffing And Talent Management
Modis IT Staffing And Talent ManagementModis IT Staffing And Talent Management
Modis IT Staffing And Talent Management
 
Introduzione al BYOD
Introduzione al BYODIntroduzione al BYOD
Introduzione al BYOD
 
Corso di Formazione: B.Y.O.D.
Corso di Formazione: B.Y.O.D.Corso di Formazione: B.Y.O.D.
Corso di Formazione: B.Y.O.D.
 

Similar to BYOD (Bring Your Own Device) Risks And Benefits

Mayfield CXO Survey: Post COVID-19 Impacts to IT
Mayfield CXO Survey: Post COVID-19 Impacts to ITMayfield CXO Survey: Post COVID-19 Impacts to IT
Mayfield CXO Survey: Post COVID-19 Impacts to ITNavin Chaddha
 
Security For Business: Are You And Your Customers Safe
Security For Business:  Are You And Your Customers SafeSecurity For Business:  Are You And Your Customers Safe
Security For Business: Are You And Your Customers Safewoodsy01
 
BYOD: D for Device or D for Disaster?
BYOD: D for Device or D for Disaster?BYOD: D for Device or D for Disaster?
BYOD: D for Device or D for Disaster?Marketing Team
 
BYOD- A Productivity Catalyst
BYOD- A Productivity CatalystBYOD- A Productivity Catalyst
BYOD- A Productivity CatalystPacket One
 
BYOD: Six Essentials for Success
BYOD: Six Essentials for SuccessBYOD: Six Essentials for Success
BYOD: Six Essentials for SuccessDMIMarketing
 
Institute for the entrepreneur v1r3
Institute for the entrepreneur v1r3Institute for the entrepreneur v1r3
Institute for the entrepreneur v1r3Dawn Simpson
 
Bring Your Own Device is a disruptive phenomenon that is a significant IT trend
Bring Your Own Device is a disruptive phenomenon that is a significant IT trendBring Your Own Device is a disruptive phenomenon that is a significant IT trend
Bring Your Own Device is a disruptive phenomenon that is a significant IT trendMartin Perry
 
Ten Commandments of BYOD
Ten Commandments of BYODTen Commandments of BYOD
Ten Commandments of BYODK Singh
 
BYOD Blue Paper
BYOD Blue PaperBYOD Blue Paper
BYOD Blue Paper4imprint
 
Come costruire una strategia vincente di BYOD, Bring Your Own Device | Clever...
Come costruire una strategia vincente di BYOD, Bring Your Own Device | Clever...Come costruire una strategia vincente di BYOD, Bring Your Own Device | Clever...
Come costruire una strategia vincente di BYOD, Bring Your Own Device | Clever...Clever Consulting
 
How to Manage the Great BlackBerry Migration
How to Manage the Great BlackBerry MigrationHow to Manage the Great BlackBerry Migration
How to Manage the Great BlackBerry MigrationTroy C. Fulton
 
Securing your digital world - Cybersecurity for SBEs
Securing your digital world - Cybersecurity for SBEsSecuring your digital world - Cybersecurity for SBEs
Securing your digital world - Cybersecurity for SBEsSonny Hashmi
 
Securing your digital world cybersecurity for sb es
Securing your digital world   cybersecurity for sb esSecuring your digital world   cybersecurity for sb es
Securing your digital world cybersecurity for sb esSonny Hashmi
 
How to build an it transformation roadmap
How to build an it transformation roadmapHow to build an it transformation roadmap
How to build an it transformation roadmapInnesGerrard
 

Similar to BYOD (Bring Your Own Device) Risks And Benefits (20)

Mayfield CXO Survey: Post COVID-19 Impacts to IT
Mayfield CXO Survey: Post COVID-19 Impacts to ITMayfield CXO Survey: Post COVID-19 Impacts to IT
Mayfield CXO Survey: Post COVID-19 Impacts to IT
 
BYOD
BYODBYOD
BYOD
 
Security For Business: Are You And Your Customers Safe
Security For Business:  Are You And Your Customers SafeSecurity For Business:  Are You And Your Customers Safe
Security For Business: Are You And Your Customers Safe
 
BYOD: D for Device or D for Disaster?
BYOD: D for Device or D for Disaster?BYOD: D for Device or D for Disaster?
BYOD: D for Device or D for Disaster?
 
ACT 2014 Business or Pleasure the Challenges of Bring Your Own Device Policie...
ACT 2014 Business or Pleasure the Challenges of Bring Your Own Device Policie...ACT 2014 Business or Pleasure the Challenges of Bring Your Own Device Policie...
ACT 2014 Business or Pleasure the Challenges of Bring Your Own Device Policie...
 
BYOD- A Productivity Catalyst
BYOD- A Productivity CatalystBYOD- A Productivity Catalyst
BYOD- A Productivity Catalyst
 
Managing BYOD in Corporate Environments
Managing BYOD in Corporate EnvironmentsManaging BYOD in Corporate Environments
Managing BYOD in Corporate Environments
 
Byod final (2)
Byod   final (2)Byod   final (2)
Byod final (2)
 
Bring Your Own Device
Bring Your Own Device Bring Your Own Device
Bring Your Own Device
 
BYOD: Six Essentials for Success
BYOD: Six Essentials for SuccessBYOD: Six Essentials for Success
BYOD: Six Essentials for Success
 
Institute for the entrepreneur v1r3
Institute for the entrepreneur v1r3Institute for the entrepreneur v1r3
Institute for the entrepreneur v1r3
 
Bring Your Own Device is a disruptive phenomenon that is a significant IT trend
Bring Your Own Device is a disruptive phenomenon that is a significant IT trendBring Your Own Device is a disruptive phenomenon that is a significant IT trend
Bring Your Own Device is a disruptive phenomenon that is a significant IT trend
 
Ten Commandments of BYOD
Ten Commandments of BYODTen Commandments of BYOD
Ten Commandments of BYOD
 
BYOD Blue Paper
BYOD Blue PaperBYOD Blue Paper
BYOD Blue Paper
 
Come costruire una strategia vincente di BYOD, Bring Your Own Device | Clever...
Come costruire una strategia vincente di BYOD, Bring Your Own Device | Clever...Come costruire una strategia vincente di BYOD, Bring Your Own Device | Clever...
Come costruire una strategia vincente di BYOD, Bring Your Own Device | Clever...
 
How to Manage the Great BlackBerry Migration
How to Manage the Great BlackBerry MigrationHow to Manage the Great BlackBerry Migration
How to Manage the Great BlackBerry Migration
 
Navigating the Flood of BYOD
Navigating the Flood of BYODNavigating the Flood of BYOD
Navigating the Flood of BYOD
 
Securing your digital world - Cybersecurity for SBEs
Securing your digital world - Cybersecurity for SBEsSecuring your digital world - Cybersecurity for SBEs
Securing your digital world - Cybersecurity for SBEs
 
Securing your digital world cybersecurity for sb es
Securing your digital world   cybersecurity for sb esSecuring your digital world   cybersecurity for sb es
Securing your digital world cybersecurity for sb es
 
How to build an it transformation roadmap
How to build an it transformation roadmapHow to build an it transformation roadmap
How to build an it transformation roadmap
 

More from Modis

Modis National Jobs Report June 2018
Modis National Jobs Report June 2018Modis National Jobs Report June 2018
Modis National Jobs Report June 2018Modis
 
Modis National Jobs Report - April 2018
Modis National Jobs Report - April 2018Modis National Jobs Report - April 2018
Modis National Jobs Report - April 2018Modis
 
National Jobs Report - March 2018
National Jobs Report - March 2018National Jobs Report - March 2018
National Jobs Report - March 2018Modis
 
Modis National Jobs Report February 2018
Modis National Jobs Report February 2018Modis National Jobs Report February 2018
Modis National Jobs Report February 2018Modis
 
Modis National Jobs Report December 2017
Modis National Jobs Report  December 2017Modis National Jobs Report  December 2017
Modis National Jobs Report December 2017Modis
 
National Jobs Report - November 2017
National Jobs Report - November 2017National Jobs Report - November 2017
National Jobs Report - November 2017Modis
 
Modis National Jobs Report - September 2017
Modis National Jobs Report - September 2017Modis National Jobs Report - September 2017
Modis National Jobs Report - September 2017Modis
 
Modis National Jobs Report - August 2017
Modis National Jobs Report - August 2017Modis National Jobs Report - August 2017
Modis National Jobs Report - August 2017Modis
 
Modis National Jobs Report July 2017
Modis National Jobs Report July 2017Modis National Jobs Report July 2017
Modis National Jobs Report July 2017Modis
 
National Jobs Report - June 2017
National Jobs Report - June 2017National Jobs Report - June 2017
National Jobs Report - June 2017Modis
 
National Jobs Report - May 2017
National Jobs Report - May 2017National Jobs Report - May 2017
National Jobs Report - May 2017Modis
 
National Jobs Report - April 2017
National Jobs Report - April 2017National Jobs Report - April 2017
National Jobs Report - April 2017Modis
 
National Jobs Report - March 2017
National Jobs Report - March 2017National Jobs Report - March 2017
National Jobs Report - March 2017Modis
 
National Jobs Report - February 2017
National Jobs Report - February 2017National Jobs Report - February 2017
National Jobs Report - February 2017Modis
 
National Jobs Report - January 2017
National Jobs Report - January 2017National Jobs Report - January 2017
National Jobs Report - January 2017Modis
 
BLS Regional Jobs Report - December 2016
BLS Regional Jobs Report - December 2016BLS Regional Jobs Report - December 2016
BLS Regional Jobs Report - December 2016Modis
 
National Jobs Report - December 2016
National Jobs Report - December 2016National Jobs Report - December 2016
National Jobs Report - December 2016Modis
 
National Jobs Report - November 2016
National Jobs Report - November 2016National Jobs Report - November 2016
National Jobs Report - November 2016Modis
 
Modis Regional Jobs Report - October 2016
Modis Regional Jobs Report - October 2016Modis Regional Jobs Report - October 2016
Modis Regional Jobs Report - October 2016Modis
 
National Jobs Report - October 2016
National Jobs Report - October 2016National Jobs Report - October 2016
National Jobs Report - October 2016Modis
 

More from Modis (20)

Modis National Jobs Report June 2018
Modis National Jobs Report June 2018Modis National Jobs Report June 2018
Modis National Jobs Report June 2018
 
Modis National Jobs Report - April 2018
Modis National Jobs Report - April 2018Modis National Jobs Report - April 2018
Modis National Jobs Report - April 2018
 
National Jobs Report - March 2018
National Jobs Report - March 2018National Jobs Report - March 2018
National Jobs Report - March 2018
 
Modis National Jobs Report February 2018
Modis National Jobs Report February 2018Modis National Jobs Report February 2018
Modis National Jobs Report February 2018
 
Modis National Jobs Report December 2017
Modis National Jobs Report  December 2017Modis National Jobs Report  December 2017
Modis National Jobs Report December 2017
 
National Jobs Report - November 2017
National Jobs Report - November 2017National Jobs Report - November 2017
National Jobs Report - November 2017
 
Modis National Jobs Report - September 2017
Modis National Jobs Report - September 2017Modis National Jobs Report - September 2017
Modis National Jobs Report - September 2017
 
Modis National Jobs Report - August 2017
Modis National Jobs Report - August 2017Modis National Jobs Report - August 2017
Modis National Jobs Report - August 2017
 
Modis National Jobs Report July 2017
Modis National Jobs Report July 2017Modis National Jobs Report July 2017
Modis National Jobs Report July 2017
 
National Jobs Report - June 2017
National Jobs Report - June 2017National Jobs Report - June 2017
National Jobs Report - June 2017
 
National Jobs Report - May 2017
National Jobs Report - May 2017National Jobs Report - May 2017
National Jobs Report - May 2017
 
National Jobs Report - April 2017
National Jobs Report - April 2017National Jobs Report - April 2017
National Jobs Report - April 2017
 
National Jobs Report - March 2017
National Jobs Report - March 2017National Jobs Report - March 2017
National Jobs Report - March 2017
 
National Jobs Report - February 2017
National Jobs Report - February 2017National Jobs Report - February 2017
National Jobs Report - February 2017
 
National Jobs Report - January 2017
National Jobs Report - January 2017National Jobs Report - January 2017
National Jobs Report - January 2017
 
BLS Regional Jobs Report - December 2016
BLS Regional Jobs Report - December 2016BLS Regional Jobs Report - December 2016
BLS Regional Jobs Report - December 2016
 
National Jobs Report - December 2016
National Jobs Report - December 2016National Jobs Report - December 2016
National Jobs Report - December 2016
 
National Jobs Report - November 2016
National Jobs Report - November 2016National Jobs Report - November 2016
National Jobs Report - November 2016
 
Modis Regional Jobs Report - October 2016
Modis Regional Jobs Report - October 2016Modis Regional Jobs Report - October 2016
Modis Regional Jobs Report - October 2016
 
National Jobs Report - October 2016
National Jobs Report - October 2016National Jobs Report - October 2016
National Jobs Report - October 2016
 

Recently uploaded

How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonetsnaman860154
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking MenDelhi Call girls
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024The Digital Insurer
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...apidays
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Scriptwesley chun
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CVKhem
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024The Digital Insurer
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc
 
Advantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessAdvantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessPixlogix Infotech
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonAnna Loughnan Colquhoun
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking MenDelhi Call girls
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxKatpro Technologies
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfsudhanshuwaghmare1
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024The Digital Insurer
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEarley Information Science
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreternaman860154
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)wesley chun
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptxHampshireHUG
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityPrincipled Technologies
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking MenDelhi Call girls
 

Recently uploaded (20)

How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CV
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 
Advantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessAdvantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your Business
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 

BYOD (Bring Your Own Device) Risks And Benefits

  • 1. CLIENT LOGO HERE The Debate Over BYOD 10.16.2012
  • 2. INTRODUCTION Eric Alfaro is the Chief Information Officer of Modis, and Modis’s parent company, Adecco Group North America. Adecco Group is the world’s largest recruitment and workforce solutions provider. Eric’s team in North America delivers technology enabled business solutions and services to over 800 Adecco locations and 8000 Adecco employees in North America. 2
  • 3. AGENDA • Definition: BYOD • BYOD – More Than a Trend, It’s a Shift • Why implement a BYOD strategy? • Best Practices in a Successful BYOD Program • Downsides to BYOD and solutions 3
  • 4. WHAT IS BYOD? BYOD or Bring Your Own Device is becoming the norm among employees and employers alike. It refers to the policy of allowing employees to purchase and integrate their own devices into a corporate operating environment. The most common devices are laptops, smartphones and tablets. While businesses benefit by having up-to-date and connected employees, IT departments often find it difficult to balance changing technology landscapes with requirements to manage and support a homogenous environment. BYOD also means dealing with new security concerns and a shift to empowered employee computing. 4
  • 5. HOW BIG IS BYOD? • BYOD is a prominent component of the “Consumerization of IT” and is rapidly changing the way IT delivers services and support. • Client virtualization products (e.g. Citrix) are mainstream solutions for securely deploying business applications to multiple end user devices, and Internet standards (HTML5) mean multi-device support is closer. • In a 2012 survey of 600 businesses, Cisco found that 95 percent allowed their employees to BYOD in some form. An example of this would be secure access to corporate email services from a BYOD, which is the most common service provided. • Of those companies, many also provided technical support for the devices. • 36% of respondents provided support across all devices and platforms. 5 Source: 2012 Cisco IBSG Horizons Study
  • 6. BYOD TOUCHES IT, HR, SOURCING, … Empowered Employees 6 Security of Business Data User Requirements and Populations IT Support Capabilities Cost Management Continuous Mobile Device Technology Evolution HR and Business Policies Employee IT Procurement HR Sourcing Sourcing
  • 7. THE BENEFITS OF BYOD FOR COMPANIES 7 • BYOD enhances employee productivity. It allows for immediate access to work when away from the office, during commutes, while traveling, and during down-time. The costs of delivering a solution should be measured against increase in employee productivity. Industry reports an average $300 to $1,300, which would depend on your measurement. • Employees are much more likely to protect and care for their own devices. This equates to decreased expenditures due to damaged or stolen devices and data loss. • Device ownership costs such as initial set-up, maintenance, insurance, and data plans are shifted to the employee rather than the employer. • For Gens Y and Z, 50% are using these technologies at home (and expecting them in the office).
  • 8. BENEFITS OF BYOD FOR EMPLOYEES • Efficiency: Carrying a single device is preferable to carrying multiple devices. • An employee’s device can be used for personal purposes so they’ll be able to save settings and documents on a single phone, laptop, or tablet. • Employees can control which devices they want. This allows them to choose the technology that best suits their needs while also guaranteeing them the freedom to upgrade and purchase devices on their own timeline.
  • 9. IMPLEMENTING – BEST PRACTICES 1. Understand your customers and operating environment 2. Prioritize deployment of BYOD services 3. Make support processes simple and clear 4. Communicate! 9
  • 10. TECHNOLOGY AND BYOD AT MODIS • How similar is Modis to your business? • Our workforce is technology driven and a large segment is comfortable with minimal technology support – a good starting point for BYOD services 10 43% 60% 67% 0% 20% 40% 60% 80% I'm comfortable using technology with little or no help I like technology Technology is important to me
  • 11. UNDERSTAND YOUR CUSTOMERS AND OPERATING ENVIRONMENT • What populations of IT consumers exist in your business? • Where do they work? How technology savvy are they? • What applications do they use? What type of data do they access? • What does it cost to support them? • What BYOD capabilities do your IT enterprise management tools have? • What corporate policies are relevant? 11
  • 12. WHERE TO START – WHAT’S HOT WITH YOUR CUSTOMERS? • In the Modis environment, Tablets and Phones account for majority of BYOD devices, which is where our current strategy is focused • The complexity of desktop applications and security requirements has made widespread laptop and desktop BYOD too costly • Consider Tiered services, rather than “One Size Fits All” • Products like Citrix and Web delivery methods are making application portability more viable on common computing devices 12 91% 79% 12% 8% 1% 7% 9% 4% 3% 3% 2% 2% 84% 89% 96% Desktop Laptop/Notebook Smartphone Standard Mobile Phone Tablet Company Device Ownership Company Company &Personal Personal
  • 13. MAKING BYOD WORK: WHAT APPLICATIONS DO YOUR EMPLOYEES NEED? • Not all applications work well across all BYOD devices • Ensure the applications your employees need will meet performance and ease of use expectations • Consider starting with basics: Email, Calendar, Web • Modis workforce relies heavily on collaboration applications, most of which run well on mobile, tablet, and laptop devices • Now is the time to start planning for future applications can be used with BYOD 13 51% 53% 54% 59% 96% 99% 0% 20% 40% 60% 80% 100% 120% Presentations Web Meetings Instant Messaging Social Media Calendar Email
  • 14. PRIORITIZE – LOOK FOR QUICK WINS AND TRAPS • Consider value vs. cost / effort / risk for different BYOD features o Trap: Supporting BYOD like traditional internal IT systems o Check: Most modern solutions include web access. Upgrading an old application might get you BYOD access out of the box • Engage your Legal, Risk Management, and Sourcing / Procurement function(s) for guidance • Think incrementally as you deploy features • Test the most widely use device / technologies and VIPs • Stick to mainstream BYOD-friendly applications if you can • Expect challenges14
  • 15. • Get right level of business and management sponsorship for success • Make BYOD program clear and align support methods with self- service tenants • Include BYOD survey items in your IT satisfaction surveys and IT cost metrics • Create employee Evangelist teams with access to news on “what’s next” to drive demand 15 COMMUNICATE!
  • 16. DOWNSIDE OF BYOD FOR COMPANIES 16 • Employee owned devices doesn’t translate to no cost for companies Ensure you consider TCO – total cost of ownership • Device types change almost daily Identify essential version and interface requirements • Sensitive and protected data can pose a security risk Have this discussion with your Risk, Legal, or Data Protection resource prior to BYOD implementation • For IT leaders it’s difficult to explain the time, effort and expense issues surrounding BYOD to business leaders If you are already doing IT cost tracking, include BYOD from day one
  • 17. DOWNSIDE OF BYOD FOR EMPLOYEES 17 • It can be costly to own and maintain a device  Consider an exception policy for employees who are unable to get a device, but need one • It may be necessary to purchase a more expensive data plan to accommodate the larger volume of communications  Think through how you’ll break out person vs. company data use • Employees may have difficulty “disconnecting” and having downtime  Work – Life balance is a key satisfaction point for most employees • When accessing the company’s network an employee may be unwittingly exposing personal information, passwords and browsing history  Acceptable use policy • In some situations an employee may be forced to relinquish the device so that it may be cleaned of company data  Communicate and help VIPs
  • 18. THE BOTTOM LINE ON BYOD • Understand what problem(s) you’re solving • Consider the total cost of BYOD, including a reimbursement policy • Plan comprehensively; it’s hard to “put the genie back in the bottle” • Be incremental in your approach to features and services to limit deployment risk and help users adjust to support • Communicate! • Review or update your security incident response processes 18

Editor's Notes

  1. Contact info is only available for 1st level connections. This includes an email address and a phone number if it’s been entered in the “Contact Settings”ORFor members who have posted contact info in their profiles aka “open networkers”