back arrow

What is BYOD (Bring Your Own Device)?

BYOD security relates strongly to the end node problem, wherein a device is used to access both sensitive and risky networks/services. Because of Internet-based risks, some very risk adverse organizations issue devices specifically for Internet use – BYOD.

BYOD has resulted in data breaches. For example, if an employee uses a smartphone to access the company network and then loses that phone, untrusted parties could retrieve any unsecured data on the phone. Another type of security breach occurs when an employee leaves the company, they do not have to give back the device, so company applications and other data may still be present on their device.