Get All Access for $5/mo

BYOD Is the Corporate Norm But Data Security Lags Far Behind "Mobile device management'' technology for securing corporate data on personal devices severely comprises employee privacy.

By Rich Campagna Edited by Dan Bova

Opinions expressed by Entrepreneur contributors are their own.

In 2009, CEOs in just about every large organization started purchasing iPhones and demanding access to corporate email. Although IT had securely managed BlackBerry deployments in place, many departments accommodated this request, only to find a few months later that thousands of employees had taken after these CEOs, with the key distinction that their iPhones were unauthorized.

As this story and countless others illustrate, the Bring Your Own Device (BYOD) phenomenon disrupted enterprise IT practically overnight. To catch up, the makeshift solution for many organizations has been "mobile device management" (MDM). This first attempt to secure BYOD was a knee-jerk reaction focused on managing personally owned devices in much the same way that corporate-owned laptops are managed.

Related: 5 Reasons BYOD for Travel Is Here to Stay

According to a recent Gartner report, by 2016, 20 percent of enterprise BYOD programs will fail due to deployment of MDM measures that are too restrictive. The issue with MDM is it secures devices, not corporate data, and has never been a solid solution for either IT or employees in BYOD environments. Let's examine a few reasons why.

IT. The IT department doesn't enjoy imposing suffocating restrictions on employees, but meeting the employee demand for BYOD often leaves them no choice. IT is chartered with securing the organization's data so they use the technology available to them – MDM. That the price of this BYOD security solution is dictatorial control over employees' personal devices is an unfortunate, necessary evil.

A recent ESG report that surveyed organizations of 1,000 or more employees shockingly found that just 21 percent have implemented and standardized an MDM solution. That means that despite BYOD being one of the biggest trends in enterprise IT today, just one in five enterprises have deployed a solution to secure it. That is cause for alarm.

Employees. Enterprise data is frequently exposed with BYOD. For example, an employee might use a personal smartphone to access data on Salesforce.com over a 4G wireless network, inadvertently sharing sensitive corporate data.

Just as the majority of employees are blissfully unaware of the potential security breaches they are exposing their company to, they would be equally mortified if they were fully aware of what MDM products can access. According to a survey carried out by Harris Interactive on behalf of mobile security firm AdaptiveMobile, most employees do not believe that their employer can see what they are doing on their personal devices, yet 89 percent of employers said they have visibility into their employees devices at all times.

Related: How the Cloud Can Save You From a 'BYOD' Tech Nightmare

This raises huge concerns for employees who are extremely uncomfortable with IT accessing personal information and controlling their device usage. Not to mention the horror stories of employees who have everything wiped from their phone if they leave a company.

The future of BYOD security. BYOD has been a shock for many organizations, but it is here to stay and the path forward is to enable employees through BYOD programs. The focus must shift from securing the device to securing corporate data on the device. Next-generation BYOD solutions must not only secure corporate data, but be device-agnostic and deploy with minimal effort on either the employee or IT's part.

At the same time, the native user experience on mobile must be taken into account and respected. Today's employees are tech-savvy and quick to write-off IT as old school and out of touch. These employees will not hesitate to "go rogue" and find workarounds if IT slows them down or invades their privacy. Next-generation BYOD security solutions must be completely frictionless and transparent to employees.

Unfortunately for IT, company-issued BlackBerry phones are unlikely to make a comeback in the corporate world, but enabling a mobile workforce does not have to be a constant give-and-take. Enterprises can embrace BYOD while maintaining security and privacy but it will require a solution with BYOD in its DNA.

Related: Dark 'Cloud' Forming: The Struggle to Balance Security and Employee Privacy

Rich Campagna

Vice President of Marketing

Rich Campagna is VP of Products at Bitglass and drives the company's product management and marketing. Prior to becoming an integral team member at Bitglass in April 2013, Rich was senior director of product management at F5 Networks, responsible for access security. Rich gained valuable experience in product management and sales engineering at Juniper Networks and at Sprint before working at F5. Rich received an M.B.A. from the UCLA Anderson School of Management and a B.S. in electrical engineering from Pennsylvania State University.

Want to be an Entrepreneur Leadership Network contributor? Apply now to join.

Editor's Pick

Science & Technology

5 Rule-Bending AI Hacks to Make Your Mornings More Productive and Profitable

By 2025, AI will transform productivity by streamlining workflows and cutting costs. Major companies like Microsoft, Google, and OpenAI are leading the way, advancing AI into "Phase 3," where tools act as digital assistants. Discover 5 AI hacks to boost efficiency and redefine your daily routine.

Side Hustle

'Hustling Every Day': These Friends Started a Side Hustle With $2,500 Each — It 'Snowballed' to Over $500,000 and Became a Multimillion-Dollar Brand

Paris Emily Nicholson and Saskia Teje Jenkins had a 2020 brainstorm session that led to a lucrative business.

Marketing

5 Critical Mistakes to Avoid When Giving a Presentation

Are you tired of enduring dull presentations? Over the years, I have compiled a list of common presentation mistakes and how to avoid them. Here are my top five tips.

Business News

Former Steve Jobs Intern Says This Is How He Would Have Approached AI

The former intern is now the CEO of AI and data company DataStax.

Business Process

How CEOs Can Take Control of Their Emails and Achieve Inbox Zero

Although there are many methodologies that leaders can use to manage their emails effectively, a consistent and thought-through process is the most effective way to systemize and respond to emails and is a step of stewardship for the effective leader.