Any company that has employees has likely noticed, it is nearly essential to have a BYOD (Bring your own Device) policy in place, as people are bringing smartphones, tablets, e-readers and more to work every day now. Not only are these devices being used for personal reasons, but for legitimate works tasks as well. Tom Kemp wrote on Forbes that this is the biggest and most visible sign of a move toward a consumer-based, people-centric IT, but there is more to the trend than that.
“It is becoming clear that this ‘BYO’ phenomena is dramatically impacting all elements of IT, not just devices,” Kemp wrote. “End users and departments for some time now have been BYO-ing Applications (‘BYOA’) in the form of deployments of Salesforce.com, Google Apps, etc., as well as business-oriented social networking apps such as Yammer (recently acquired by Microsoft) and Jive (a recent IPO). And these same users and departments are also even BYO-ing servers (‘BYOS’) by independently spinning up servers outside the firewall on Amazon and Rackspace.”
There are also people that bring their own files (BYOF) and documents by using websites like Dropbox and Box.com. As consumers have bought things on their own and used it how they wished in personal lives for many years, ownership is being taken in IT in a similar fashion, according to what Kemp wrote on Forbes. It’s also expanding how IT is being used within organizations, as it is no longer a department only thing to use a piece of technology. Aspects of IT such as security risk, devices used, access location and enterprise IT systems have gone from small to large within just the last 15 years, something that many did not see coming and companies are still trying to catch up with.
Saying ‘no’ may be dangerous
Thor Olavsrud quoted and industry insider on CIO.com who said that there is now more chaos in IT, but the department should be embracing this chaos, as consumerization and BYOD is something of an inevitability and should be secured as such.
“In other words, if the IT organization responds by saying ‘no,’ users will turn to shadow IT to get what they want,” Olavsrud said. “And that’s not limited to … BYOD: Rogue employees will find a way to get their work done whether they require an unsanctioned device, application or a service like Dropbox.”
Consumerization News from SimplySecurity.com by Trend Micro