The Future of BYOD Is CYOD

The bring-your-own-device (BYOD) trend has truly taken off, largely because business leaders know it’s increasingly something employees want. IT departments may not always be keen on BYOD—IT managers have to closely monitor employees’ devices to ensure the business remains protected—but they know they have to plan for it. Moving from BYOD to choose-your-own-device (CYOD) can be a good option for companies to minimize risks, while only introducing a few. (If your company uses Microsoft SCCM, there is an additional opportunity to make your IT life a little easier…I’ll explain later in this article.)

BYOD is popular—and it affects the workspace

This dynamic can be difficult for companies to accommodate. Employees are now less concerned about the technology that their companies can provide—they’re bringing and using their own devices anyway.

According to a report by Forrester Research, as many as 53% of employees brought their own devices to work in 2012. By 2018, those numbers increased to 65%. This trend—as well as other requirements of the digital age—means that companies need to invest a significant portion of their revenue on IT and technological infrastructure. In fact, according to a Deloitte study, 57% of companies’ IT budgets are spent on business operations, including employee technology.

Is your BYOD policy really secure?

This may sound like an obvious thing to ensure, but a surprisingly large number of organizations falter here. Many of the everyday tasks performed by your employees are inherently insecure.

If your BYOD security program only covers a specific operating system (for example, Windows), many devices (including the ever-popular iPhone®) are automatically out of scope. If you have Mac® computers on premises and don’t manage them, you leave them vulnerable to Meltdown and Spectre.

I highly recommend this exceptional 10-minute read from TechGenix about how to check your BYOD policy for consistency and security by asking yourself the right questions and aligning with your IT department and company goals.

Why CYOD is a smart move in 2019

BYOD brings up new problems that companies have to mitigate. It’s difficult to manage employee-owned devices, so you can’t account for things like software updates, malware protection, and other protective strategies that can secure companies’ sensitive information. Employees are also more likely to use their personal devices on unsecured wireless networks, allow other people to use them, or leave company information on the device when they ultimately get rid of it.

For these reasons, CYOD is a step forward from a traditional BYOD policy. With CYOD, IT departments define a lineup of desktop and mobile devices that employees can get from their employer. Because they are technically company-owned devices, this mitigates the risks associated with BYOD. Employees can also get the type of device they like. People tend to have specific tastes and desires when it comes to their technology. Some employees are adamantly “Apple® people,” while others will always prefer a Lenovo device.

However, to implement CYOD, companies need an enterprise-level device management solution to effectively manage the offered devices. Do you know how many Mac computers have access to your company’s sensitive data?

If your company already uses Microsoft SCCM for managing Windows endpoints, consider Parallels® Mac Management for Microsoft® SCCM, an SCCM plug-in that allows IT admins to manage Mac devices like Windows PCs. Having Windows and Mac managed in Microsoft SCCM (in a single pane of glass) is a good strategy. It’s backed by Microsoft’s experience in Windows endpoint management and its commitment to providing tools like SCCM and Intune for enterprise-level device management.

Whatever decision you and your stakeholders make, it’s important to make note of the points made here to ensure the viability and longevity of your solution.