Online safety , Bring Your Own Device (BYOD), security and privacy: terms that crop up daily. But what is actually going on in normal human language and what it means for us as individuals often remains a mystery. Time for an in-depth interview with none other than Jan Stedehouder , author of the book BYOD . “Let the security debate of 2013 put the importance of the individual first.”
'Bring Your Own Device' in the Netherlands
How are we doing in the Netherlands, so how much do we actually use BYOD?
“There are no hard figures to determine actual use. Various studies commissioned by various suppliers mention percentages ranging from approximately 45% to over 90% of employees within organizations who use personal devices for business purposes. It is clear that Dutch professionals are leading the way worldwide in this.”
“In fact, not at all, provided the work device is up-to-date. BYOD arises because professionals purchase sweden telegram data private smartphones, tablets or computers that are more powerful, more extensive in terms of functionality or faster than the work devices. Also think of modern software, applications and online services.”
What are the benefits of BYOD?
“Companies expect to use IT resources at a lower cost, with less management and fewer problems such as loss, theft or damage due to careless actions, since employees will take better care of their own things than of business things. Personally, I think that is a narrow and incorrect view of the benefits. BYOD does not directly result in cost savings and management is limited in many organizations, so there is nothing more to be gained there. You should allow BYOD, because it allows you as a company to deploy innovative technology more quickly. You show that you take your professionals seriously and give them the freedom to use the right tools to achieve the result.”
What are the disadvantages, and therefore the biggest dangers?
“IT and security are quick to talk about the emergence of unmanageable and unsafe situations on the corporate network. That is not so strange, because the same people made sure that USB ports were closed, to prevent sensitive company data from being taken in this way. Several stolen laptops made the front pages of newspapers, so from a business perspective it is not an illogical approach. Fort ICT has become larger and more complex over the years. As soon as you are through the gate, the sensitive data is there for the taking. We talk about data classification as a solution, but we have hardly implemented it. BYOD results in relaxation at the gate, but does not change the fundamental insecurity behind the gate.