{"id":1121,"date":"2015-08-17T13:41:55","date_gmt":"2015-08-17T13:41:55","guid":{"rendered":"http:\/\/softone-gr.azurewebsites.net\/blog\/?p=1121"},"modified":"2016-11-02T14:39:58","modified_gmt":"2016-11-02T14:39:58","slug":"byod-to-cyod","status":"publish","type":"post","link":"https:\/\/www.softone.com.cy\/blog\/?p=1121","title":{"rendered":"Say &#8220;hello&#8221; to CYOD!"},"content":{"rendered":"<p>The BYOD (Bring Your Own Device) policy that many organizations have been implementing over the past years, has successfully enhanced enterprise mobility and productivity, enabling today\u2019s employees significantly benefit from a number of proven advantages.<\/p>\n<p>Nevertheless, a series of studies and surveys have indicated that the business world is still largely \u201cignorant\u201d when it comes to BYOD. Actually, in CompTIA\u2019s latest survey, 53% of the participants indicated that they have not introduced BYOD into their daily operations at all. It is worth noting that this percentage was much lower in a similar study conducted by the same company in 2013, at which point it was only 34%. The explanation behind this is quite simple: businesses are often intimidated by the complex legal and financial requirements that BYOD entails. For example, how can a business estimate an executive\u2019s fee for the work done over the phone? Or, how can it estimate the overtime compensation when these extra hours are exclusively related to work done over the phone? And of course, these are just two examples of the puzzle that businesses have to solve when deciding to implement a BYOD policy.<\/p>\n<p>Nevertheless, if you try to document the pros and cons of implementing a BYOD policy, the real issue for not going through with such a decision is security policies, especially since most mobile devices include or provide access to exceptionally critical business information. Based on Gartner\u2019s survey, one out of four business users admits that they have come across some safety issue while using their mobile device. Even more impressive is the fact that, according to Osterman Research, 15% of employees actually believe they have limited, or even no responsibility at all in regard to the protection of the corporate data stored in their mobile phone, tablet or notebook.<\/p>\n<p>The new and more advanced version of BYOD, called Choose Your Own Device (CYOD), aspires to resolve these issues! CYOD seems to provide the right \u201cmix\u201d of traditional and new practices, thus satisfying all of the business users\u2019 needs. How does it work? It enables employees to select from a wide range of pre-approved devices, featuring pre-installed applications and security software, admin, firewall and network settings. On their part, businesses must emphasize on combining IT security with flexibility. It would be useful for them to be able to offer a variety of devices and at the same time implement a supplementary strategy regarding the protection of business mobile devices. Emphasis should also be placed on the active protection methods, by implementing an approach that mitigates the device safety management risks.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>The BYOD (Bring Your Own Device) policy that many organizations have been implementing over the past years, has successfully enhanced enterprise mobility and productivity, enabling today\u2019s employees significantly benefit from a number of proven advantages. Nevertheless, a series of studies and surveys have indicated that the business world is still largely \u201cignorant\u201d when it comes &hellip; <a href=\"https:\/\/www.softone.com.cy\/blog\/?p=1121\" class=\"more-link\">Continue reading <span class=\"screen-reader-text\">Say &#8220;hello&#8221; to CYOD!<\/span><\/a><\/p>\n","protected":false},"author":11,"featured_media":1131,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":[],"categories":[121],"tags":[231],"_links":{"self":[{"href":"https:\/\/www.softone.com.cy\/blog\/index.php?rest_route=\/wp\/v2\/posts\/1121"}],"collection":[{"href":"https:\/\/www.softone.com.cy\/blog\/index.php?rest_route=\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.softone.com.cy\/blog\/index.php?rest_route=\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.softone.com.cy\/blog\/index.php?rest_route=\/wp\/v2\/users\/11"}],"replies":[{"embeddable":true,"href":"https:\/\/www.softone.com.cy\/blog\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=1121"}],"version-history":[{"count":5,"href":"https:\/\/www.softone.com.cy\/blog\/index.php?rest_route=\/wp\/v2\/posts\/1121\/revisions"}],"predecessor-version":[{"id":10571,"href":"https:\/\/www.softone.com.cy\/blog\/index.php?rest_route=\/wp\/v2\/posts\/1121\/revisions\/10571"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.softone.com.cy\/blog\/index.php?rest_route=\/wp\/v2\/media\/1131"}],"wp:attachment":[{"href":"https:\/\/www.softone.com.cy\/blog\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=1121"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.softone.com.cy\/blog\/index.php?rest_route=%2Fwp%2Fv2%2Fcategories&post=1121"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.softone.com.cy\/blog\/index.php?rest_route=%2Fwp%2Fv2%2Ftags&post=1121"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}