SlideShare une entreprise Scribd logo
1  sur  1
Télécharger pour lire hors ligne
10
INCREDIBLE
BYOD FACTS
An astonishing 90% of American workers are already
using their smartphones in one way or another for
work, whether or not their employer has an official
BYOD policy.
But what does that mean for companies?
Read on to find out how this enterprise mobility
phenomenon will affect your business in more ways
than you imagined.
HERE ARE 10 LESSER-KNOWN BYOD FACTS
TO CATCH YOU UP TO SPEED:
8
74% of companies allow some
sort of BYOD usage – but fewer
than 10% of them are ‘fully
aware’ of the devices that are
accessing their network.
2By 2017, half of all employers
will require employees to
supply their own device for
work purposes.
166% of companies allow - or even
oblige - employees to bring their
own mobile devices to work.
3By 2016, the average organization
will spend more than $300 per year
per employee on mobile applications,
security, management and support.
4
BYOD is great for a company’s
bottom line – but if you’re not
careful it can be bad for security.
39% of BYOD users don’t protect
their phones with a password –
and 52% report using
unprotected wifi connections.
5
Education is the sector with the
highest proportion of people using
their smartphones at work: 95.2%.
Retail and legal bring up the rear with
77.1% and 78.6% respectively.
1
23
6
BYOD programs tend to
increase the life expectancy of
devices. Because users choose
them themselves, they look
after them better.
7The mobile revolution is here:
87% of people now use a
smartphone, 68% tablets and
79% laptops.
9
Two out of three people believe it is
their responsibility - not their IT
department’s – to keep their mobile
data private and secure. But 55% of
them also say they’ve ‘worked around’
company mobile policies by sending
work email or documents to their
personal email accounts on their
phones.
1060% of people believe they are
more productive if they are
using devices they have chosen
themselves.

Contenu connexe

Tendances

Feds: You have a BYOD program whether you like it or not
Feds: You have a BYOD program whether you like it or notFeds: You have a BYOD program whether you like it or not
Feds: You have a BYOD program whether you like it or notLookout
 
Keys to Network Security & Shocking Statistics
Keys to Network Security & Shocking StatisticsKeys to Network Security & Shocking Statistics
Keys to Network Security & Shocking StatisticsChristine Spicuzza
 
Norton Mobile Apps Survey Report
Norton Mobile Apps Survey ReportNorton Mobile Apps Survey Report
Norton Mobile Apps Survey ReportSymantec
 
Ericsson ConsumerLab: Experience shapes mobile customer loyalty - Infographic
Ericsson ConsumerLab: Experience shapes mobile customer loyalty - InfographicEricsson ConsumerLab: Experience shapes mobile customer loyalty - Infographic
Ericsson ConsumerLab: Experience shapes mobile customer loyalty - InfographicEricsson
 
State of Application Security Vol. 4
State of Application Security Vol. 4State of Application Security Vol. 4
State of Application Security Vol. 4IBM Security
 
Symantec Intelligence Report: May 2015
Symantec Intelligence Report: May 2015Symantec Intelligence Report: May 2015
Symantec Intelligence Report: May 2015Symantec
 
India Threat Lanscape as per Symantec Research
India Threat Lanscape as per Symantec ResearchIndia Threat Lanscape as per Symantec Research
India Threat Lanscape as per Symantec ResearchMehul Doshi
 
Digital security update: 10 cybersecurity and privacy threats
Digital security update: 10 cybersecurity and privacy threatsDigital security update: 10 cybersecurity and privacy threats
Digital security update: 10 cybersecurity and privacy threatsEntefy
 
Information Management: An Oxymoron
Information Management: An OxymoronInformation Management: An Oxymoron
Information Management: An OxymoronJohn Mancini
 
2015 Cybersecurity Predictions
2015 Cybersecurity Predictions2015 Cybersecurity Predictions
2015 Cybersecurity PredictionsLookout
 
Social mobile recruiting
Social mobile recruitingSocial mobile recruiting
Social mobile recruitingImomentous
 
Internet Safety: Social, Mobile, Messy
Internet Safety: Social, Mobile, MessyInternet Safety: Social, Mobile, Messy
Internet Safety: Social, Mobile, MessyMarian Merritt
 
Estudio cibercimen-2013-ciberinvestigacion
Estudio cibercimen-2013-ciberinvestigacionEstudio cibercimen-2013-ciberinvestigacion
Estudio cibercimen-2013-ciberinvestigacionSelva Orejón
 
Relentless Mobile Threats to Avoid
Relentless Mobile Threats to AvoidRelentless Mobile Threats to Avoid
Relentless Mobile Threats to AvoidLookout
 
Why job applications from mobile are crucial to your business
Why job applications from mobile are crucial to your businessWhy job applications from mobile are crucial to your business
Why job applications from mobile are crucial to your businessIvo Brett
 
It consumerisation presentation
It  consumerisation presentationIt  consumerisation presentation
It consumerisation presentationrevaathey
 
5 Ways to Protect your Mobile Security
5 Ways to Protect your Mobile Security5 Ways to Protect your Mobile Security
5 Ways to Protect your Mobile SecurityLookout
 
The Norton Report 2013
The Norton Report 2013The Norton Report 2013
The Norton Report 2013Marian Merritt
 

Tendances (20)

Tips and Tricks on Securing your Android Devices
Tips and Tricks on Securing your Android DevicesTips and Tricks on Securing your Android Devices
Tips and Tricks on Securing your Android Devices
 
Feds: You have a BYOD program whether you like it or not
Feds: You have a BYOD program whether you like it or notFeds: You have a BYOD program whether you like it or not
Feds: You have a BYOD program whether you like it or not
 
Keys to Network Security & Shocking Statistics
Keys to Network Security & Shocking StatisticsKeys to Network Security & Shocking Statistics
Keys to Network Security & Shocking Statistics
 
Norton Mobile Apps Survey Report
Norton Mobile Apps Survey ReportNorton Mobile Apps Survey Report
Norton Mobile Apps Survey Report
 
Ericsson ConsumerLab: Experience shapes mobile customer loyalty - Infographic
Ericsson ConsumerLab: Experience shapes mobile customer loyalty - InfographicEricsson ConsumerLab: Experience shapes mobile customer loyalty - Infographic
Ericsson ConsumerLab: Experience shapes mobile customer loyalty - Infographic
 
State of Application Security Vol. 4
State of Application Security Vol. 4State of Application Security Vol. 4
State of Application Security Vol. 4
 
Symantec Intelligence Report: May 2015
Symantec Intelligence Report: May 2015Symantec Intelligence Report: May 2015
Symantec Intelligence Report: May 2015
 
India Threat Lanscape as per Symantec Research
India Threat Lanscape as per Symantec ResearchIndia Threat Lanscape as per Symantec Research
India Threat Lanscape as per Symantec Research
 
Digital security update: 10 cybersecurity and privacy threats
Digital security update: 10 cybersecurity and privacy threatsDigital security update: 10 cybersecurity and privacy threats
Digital security update: 10 cybersecurity and privacy threats
 
Information Management: An Oxymoron
Information Management: An OxymoronInformation Management: An Oxymoron
Information Management: An Oxymoron
 
Network
NetworkNetwork
Network
 
2015 Cybersecurity Predictions
2015 Cybersecurity Predictions2015 Cybersecurity Predictions
2015 Cybersecurity Predictions
 
Social mobile recruiting
Social mobile recruitingSocial mobile recruiting
Social mobile recruiting
 
Internet Safety: Social, Mobile, Messy
Internet Safety: Social, Mobile, MessyInternet Safety: Social, Mobile, Messy
Internet Safety: Social, Mobile, Messy
 
Estudio cibercimen-2013-ciberinvestigacion
Estudio cibercimen-2013-ciberinvestigacionEstudio cibercimen-2013-ciberinvestigacion
Estudio cibercimen-2013-ciberinvestigacion
 
Relentless Mobile Threats to Avoid
Relentless Mobile Threats to AvoidRelentless Mobile Threats to Avoid
Relentless Mobile Threats to Avoid
 
Why job applications from mobile are crucial to your business
Why job applications from mobile are crucial to your businessWhy job applications from mobile are crucial to your business
Why job applications from mobile are crucial to your business
 
It consumerisation presentation
It  consumerisation presentationIt  consumerisation presentation
It consumerisation presentation
 
5 Ways to Protect your Mobile Security
5 Ways to Protect your Mobile Security5 Ways to Protect your Mobile Security
5 Ways to Protect your Mobile Security
 
The Norton Report 2013
The Norton Report 2013The Norton Report 2013
The Norton Report 2013
 

En vedette (12)

3 Killer Benefits of Unified Communications
3 Killer Benefits of Unified Communications3 Killer Benefits of Unified Communications
3 Killer Benefits of Unified Communications
 
Arkadin Total Connect
Arkadin Total ConnectArkadin Total Connect
Arkadin Total Connect
 
Flexwork by Arkadin
Flexwork by ArkadinFlexwork by Arkadin
Flexwork by Arkadin
 
History of Collaboration and Communication
History of Collaboration and CommunicationHistory of Collaboration and Communication
History of Collaboration and Communication
 
100 years of great collaboration
100 years of great collaboration100 years of great collaboration
100 years of great collaboration
 
How Is Your Data Shared? 10 Surprising Stats
How Is Your Data Shared? 10 Surprising StatsHow Is Your Data Shared? 10 Surprising Stats
How Is Your Data Shared? 10 Surprising Stats
 
Evolution des modes de travail à distance
Evolution des modes de travail à distanceEvolution des modes de travail à distance
Evolution des modes de travail à distance
 
Incredible Facts about BYOD
Incredible Facts about BYODIncredible Facts about BYOD
Incredible Facts about BYOD
 
Who benefits from remote working?
Who benefits from remote working?Who benefits from remote working?
Who benefits from remote working?
 
Tools for Remote Worker
Tools for Remote WorkerTools for Remote Worker
Tools for Remote Worker
 
Top Collaboration Challenges for Techies
Top Collaboration Challenges for TechiesTop Collaboration Challenges for Techies
Top Collaboration Challenges for Techies
 
The Power of Colors on Workplace Harmony
The Power of Colors on Workplace HarmonyThe Power of Colors on Workplace Harmony
The Power of Colors on Workplace Harmony
 

Similaire à 10 Incredible BYOD Facts

Mobile Security Trends in the Workplace
Mobile Security Trends in the WorkplaceMobile Security Trends in the Workplace
Mobile Security Trends in the WorkplaceBlueboxer2014
 
The impact of mobile devices on information security
The impact of mobile devices on information securityThe impact of mobile devices on information security
The impact of mobile devices on information securityBee_Ware
 
Corporate Data Goes Mobile
Corporate Data Goes MobileCorporate Data Goes Mobile
Corporate Data Goes MobileNetApp
 
5 Ways BYOD Can Grow Your Business
5 Ways BYOD Can Grow Your Business5 Ways BYOD Can Grow Your Business
5 Ways BYOD Can Grow Your BusinessVoxer App
 
“The Impact of Mobile Devices on Information Security: A Survey of IT and Sec...
“The Impact of Mobile Devices on Information Security: A Survey of IT and Sec...“The Impact of Mobile Devices on Information Security: A Survey of IT and Sec...
“The Impact of Mobile Devices on Information Security: A Survey of IT and Sec...Thierry Labro
 
The Hybrid Mobile Landscape
The Hybrid Mobile LandscapeThe Hybrid Mobile Landscape
The Hybrid Mobile LandscapeVisage Mobile
 
The Future of BYOD, BYOA and Consumerization
The Future of BYOD, BYOA and ConsumerizationThe Future of BYOD, BYOA and Consumerization
The Future of BYOD, BYOA and ConsumerizationJay McBain
 
Managing Mobile Business Insecurities
Managing Mobile Business InsecuritiesManaging Mobile Business Insecurities
Managing Mobile Business InsecuritiesPing Identity
 
BYOD Blue Paper
BYOD Blue PaperBYOD Blue Paper
BYOD Blue Paper4imprint
 
Mbs t17 o'neil-mbs-t17 rsa-realizing-mobile-enterprise
Mbs t17 o'neil-mbs-t17 rsa-realizing-mobile-enterpriseMbs t17 o'neil-mbs-t17 rsa-realizing-mobile-enterprise
Mbs t17 o'neil-mbs-t17 rsa-realizing-mobile-enterpriseSelectedPresentations
 
How Aligned Are IT, Employees and Security Practices in Today's Mobile World?
How Aligned Are IT, Employees and Security Practices in Today's Mobile World?How Aligned Are IT, Employees and Security Practices in Today's Mobile World?
How Aligned Are IT, Employees and Security Practices in Today's Mobile World?Ping Identity
 
BYOD, BYOA and Consumerization
BYOD, BYOA and ConsumerizationBYOD, BYOA and Consumerization
BYOD, BYOA and ConsumerizationJay McBain
 
Surviving the mobile invasion - They're spreading fast and they're vulnerable
Surviving the mobile invasion - They're spreading fast and they're vulnerableSurviving the mobile invasion - They're spreading fast and they're vulnerable
Surviving the mobile invasion - They're spreading fast and they're vulnerableCapgemini
 
11 Reasons Why Your Company Could Be In Danger
11 Reasons Why Your Company Could Be In Danger11 Reasons Why Your Company Could Be In Danger
11 Reasons Why Your Company Could Be In DangerCopper Mobile, Inc.
 
Bring Your Own Device 2014 TeamMate User Conference Palm Desert California
Bring Your Own Device 2014 TeamMate User Conference Palm Desert CaliforniaBring Your Own Device 2014 TeamMate User Conference Palm Desert California
Bring Your Own Device 2014 TeamMate User Conference Palm Desert CaliforniaJim Kaplan CIA CFE
 
It consumerisation presentation
It  consumerisation presentationIt  consumerisation presentation
It consumerisation presentationrevaathey
 

Similaire à 10 Incredible BYOD Facts (20)

Mobile Security Trends in the Workplace
Mobile Security Trends in the WorkplaceMobile Security Trends in the Workplace
Mobile Security Trends in the Workplace
 
The Workplace of Things
The Workplace of ThingsThe Workplace of Things
The Workplace of Things
 
The consumerization of it
The consumerization of itThe consumerization of it
The consumerization of it
 
The impact of mobile devices on information security
The impact of mobile devices on information securityThe impact of mobile devices on information security
The impact of mobile devices on information security
 
Corporate Data Goes Mobile
Corporate Data Goes MobileCorporate Data Goes Mobile
Corporate Data Goes Mobile
 
5 Ways BYOD Can Grow Your Business
5 Ways BYOD Can Grow Your Business5 Ways BYOD Can Grow Your Business
5 Ways BYOD Can Grow Your Business
 
“The Impact of Mobile Devices on Information Security: A Survey of IT and Sec...
“The Impact of Mobile Devices on Information Security: A Survey of IT and Sec...“The Impact of Mobile Devices on Information Security: A Survey of IT and Sec...
“The Impact of Mobile Devices on Information Security: A Survey of IT and Sec...
 
The Hybrid Mobile Landscape
The Hybrid Mobile LandscapeThe Hybrid Mobile Landscape
The Hybrid Mobile Landscape
 
The Future of BYOD, BYOA and Consumerization
The Future of BYOD, BYOA and ConsumerizationThe Future of BYOD, BYOA and Consumerization
The Future of BYOD, BYOA and Consumerization
 
Managing Mobile Business Insecurities
Managing Mobile Business InsecuritiesManaging Mobile Business Insecurities
Managing Mobile Business Insecurities
 
BYOD Blue Paper
BYOD Blue PaperBYOD Blue Paper
BYOD Blue Paper
 
Mbs t17 o'neil-mbs-t17 rsa-realizing-mobile-enterprise
Mbs t17 o'neil-mbs-t17 rsa-realizing-mobile-enterpriseMbs t17 o'neil-mbs-t17 rsa-realizing-mobile-enterprise
Mbs t17 o'neil-mbs-t17 rsa-realizing-mobile-enterprise
 
How Aligned Are IT, Employees and Security Practices in Today's Mobile World?
How Aligned Are IT, Employees and Security Practices in Today's Mobile World?How Aligned Are IT, Employees and Security Practices in Today's Mobile World?
How Aligned Are IT, Employees and Security Practices in Today's Mobile World?
 
BYOD, BYOA and Consumerization
BYOD, BYOA and ConsumerizationBYOD, BYOA and Consumerization
BYOD, BYOA and Consumerization
 
Surviving the mobile invasion - They're spreading fast and they're vulnerable
Surviving the mobile invasion - They're spreading fast and they're vulnerableSurviving the mobile invasion - They're spreading fast and they're vulnerable
Surviving the mobile invasion - They're spreading fast and they're vulnerable
 
11 Reasons Why Your Company Could Be In Danger
11 Reasons Why Your Company Could Be In Danger11 Reasons Why Your Company Could Be In Danger
11 Reasons Why Your Company Could Be In Danger
 
To BYOD or not to BYOD?
To BYOD or not to BYOD?To BYOD or not to BYOD?
To BYOD or not to BYOD?
 
Bring Your Own Device 2014 TeamMate User Conference Palm Desert California
Bring Your Own Device 2014 TeamMate User Conference Palm Desert CaliforniaBring Your Own Device 2014 TeamMate User Conference Palm Desert California
Bring Your Own Device 2014 TeamMate User Conference Palm Desert California
 
It consumerisation presentation
It  consumerisation presentationIt  consumerisation presentation
It consumerisation presentation
 
Get Ready for Wearables at Work
Get Ready for Wearables at WorkGet Ready for Wearables at Work
Get Ready for Wearables at Work
 

Plus de The Cloud Communications division of NTT Ltd.

Руководство Arkadin по организации собраний, к которым можно подключаться из ...
Руководство Arkadin по организации собраний, к которым можно подключаться из ...Руководство Arkadin по организации собраний, к которым можно подключаться из ...
Руководство Arkadin по организации собраний, к которым можно подключаться из ...The Cloud Communications division of NTT Ltd.
 
Собрания, отвечающие вашим уникальным потребностям
Собрания, отвечающие вашим уникальным потребностямСобрания, отвечающие вашим уникальным потребностям
Собрания, отвечающие вашим уникальным потребностямThe Cloud Communications division of NTT Ltd.
 

Plus de The Cloud Communications division of NTT Ltd. (20)

The Cloud Communications division of NTT Ltd.
The Cloud Communications division of NTT Ltd. The Cloud Communications division of NTT Ltd.
The Cloud Communications division of NTT Ltd.
 
Reuniões tão únicas quanto você
Reuniões tão únicas quanto vocêReuniões tão únicas quanto você
Reuniões tão únicas quanto você
 
Um dia na vida de um usuário do ArkadinVision
Um dia na vida de um usuário do ArkadinVisionUm dia na vida de um usuário do ArkadinVision
Um dia na vida de um usuário do ArkadinVision
 
Green and on-the-go: Actioning environmental prosperity through tech
Green and on-the-go: Actioning environmental prosperity through techGreen and on-the-go: Actioning environmental prosperity through tech
Green and on-the-go: Actioning environmental prosperity through tech
 
Руководство Arkadin по организации собраний, к которым можно подключаться из ...
Руководство Arkadin по организации собраний, к которым можно подключаться из ...Руководство Arkadin по организации собраний, к которым можно подключаться из ...
Руководство Arkadin по организации собраний, к которым можно подключаться из ...
 
Собрания, отвечающие вашим уникальным потребностям
Собрания, отвечающие вашим уникальным потребностямСобрания, отвечающие вашим уникальным потребностям
Собрания, отвечающие вашим уникальным потребностям
 
Tıpkı sizin kadar benzersiz toplantılar
Tıpkı sizin kadar benzersiz toplantılarTıpkı sizin kadar benzersiz toplantılar
Tıpkı sizin kadar benzersiz toplantılar
 
Bir ArkadinVision Kullanıcısının Hayatından Bir Gün
Bir ArkadinVision Kullanıcısının Hayatından Bir GünBir ArkadinVision Kullanıcısının Hayatından Bir Gün
Bir ArkadinVision Kullanıcısının Hayatından Bir Gün
 
Spotkania tak wyjątkowe jak Ty
Spotkania tak wyjątkowe jak TySpotkania tak wyjątkowe jak Ty
Spotkania tak wyjątkowe jak Ty
 
Dzień z życia użytkownika ArkadinVision
Dzień z życia użytkownika ArkadinVisionDzień z życia użytkownika ArkadinVision
Dzień z życia użytkownika ArkadinVision
 
Schůzky a konference jsou jedinečné jako vy
Schůzky a konference jsou jedinečné jako vySchůzky a konference jsou jedinečné jako vy
Schůzky a konference jsou jedinečné jako vy
 
Všední den v životě uživatele ArkadinVision
Všední den v životě uživatele ArkadinVisionVšední den v životě uživatele ArkadinVision
Všední den v životě uživatele ArkadinVision
 
How Much Energy Would Your Business Save With Remote Working
How Much Energy Would Your Business Save With Remote WorkingHow Much Energy Would Your Business Save With Remote Working
How Much Energy Would Your Business Save With Remote Working
 
10 ways to master the art of productivity Bruce Lee style
10 ways to master the art of productivity Bruce Lee style10 ways to master the art of productivity Bruce Lee style
10 ways to master the art of productivity Bruce Lee style
 
The heroic journey to the digital workplace: Our hero returns
The heroic journey to the digital workplace: Our hero returnsThe heroic journey to the digital workplace: Our hero returns
The heroic journey to the digital workplace: Our hero returns
 
7 pieces of furniture that increase your productivity
7 pieces of furniture that increase your productivity7 pieces of furniture that increase your productivity
7 pieces of furniture that increase your productivity
 
Top 7 tools to supercharge your team based collaboration
Top 7 tools to supercharge your team based collaborationTop 7 tools to supercharge your team based collaboration
Top 7 tools to supercharge your team based collaboration
 
Arkadin Value Prop video
Arkadin Value Prop videoArkadin Value Prop video
Arkadin Value Prop video
 
Arkadin value prop Event
Arkadin value prop EventArkadin value prop Event
Arkadin value prop Event
 
Arkadin value prop Corporate
Arkadin value prop CorporateArkadin value prop Corporate
Arkadin value prop Corporate
 

Dernier

Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024The Digital Insurer
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfEnterprise Knowledge
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityPrincipled Technologies
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024Results
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptxHampshireHUG
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...shyamraj55
 
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...gurkirankumar98700
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationRidwan Fadjar
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slidevu2urc
 
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024BookNet Canada
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024Rafal Los
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationSafe Software
 
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j
 
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure servicePooja Nehwal
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking MenDelhi Call girls
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slidespraypatel2
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreternaman860154
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Igalia
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountPuma Security, LLC
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationRadu Cotescu
 

Dernier (20)

Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
 
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 Presentation
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
 
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
 
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slides
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 

10 Incredible BYOD Facts

  • 1. 10 INCREDIBLE BYOD FACTS An astonishing 90% of American workers are already using their smartphones in one way or another for work, whether or not their employer has an official BYOD policy. But what does that mean for companies? Read on to find out how this enterprise mobility phenomenon will affect your business in more ways than you imagined. HERE ARE 10 LESSER-KNOWN BYOD FACTS TO CATCH YOU UP TO SPEED: 8 74% of companies allow some sort of BYOD usage – but fewer than 10% of them are ‘fully aware’ of the devices that are accessing their network. 2By 2017, half of all employers will require employees to supply their own device for work purposes. 166% of companies allow - or even oblige - employees to bring their own mobile devices to work. 3By 2016, the average organization will spend more than $300 per year per employee on mobile applications, security, management and support. 4 BYOD is great for a company’s bottom line – but if you’re not careful it can be bad for security. 39% of BYOD users don’t protect their phones with a password – and 52% report using unprotected wifi connections. 5 Education is the sector with the highest proportion of people using their smartphones at work: 95.2%. Retail and legal bring up the rear with 77.1% and 78.6% respectively. 1 23 6 BYOD programs tend to increase the life expectancy of devices. Because users choose them themselves, they look after them better. 7The mobile revolution is here: 87% of people now use a smartphone, 68% tablets and 79% laptops. 9 Two out of three people believe it is their responsibility - not their IT department’s – to keep their mobile data private and secure. But 55% of them also say they’ve ‘worked around’ company mobile policies by sending work email or documents to their personal email accounts on their phones. 1060% of people believe they are more productive if they are using devices they have chosen themselves.