Employee-Owned Devices’ Disadvantages for Company Business

Subject: Case Studies
Pages: 2
Words: 357
Reading time:
2 min

Using employee-owned devices is associated with several disadvantages. The company might be forced to spend more funds on securing the current IT networks since different devices have different security protocols. Since each employee has his or her own taste on the kind of personal device to bring to work, the IT department will find it a challenge to keep track of these devices and provide effective support to all. This challenge requires extra effort in the IT management to avoid a potential breach of the security protocols. Specifically, since organization XYZ is a big company, this potential IT security challenge is substantial and cannot be ignored. Another demerit of personal devices at the workplace is the fact that some of these gadgets cannot integrate into the current infrastructure of the XYZ organization. For instance, a simple Android device is not compatible with the current IT network. Moreover, there are specific applications of the company that cannot effectively run on some personal mobile devices.

Most personal devices bring about unnecessary distractions in the workplace. For instance, most mobile devices have social and other game apps that may be inappropriately used during office hours. Moreover, it is difficult to protect the XYZ data since these devices are mobile, and the employees will carry them home at the end of work hours. This remote use of personal devices presents a real threat to confidential data and increases the risk of exposing sensitive information to a third party by design or default. For instance, an employee carrying work home on his or her personal device may misplace it. The third party in possession of such a device can do anything with this information to the disadvantage of the XYZ Company.

The home network is not as secure as the XYZ IT network layers. This means that remote use of the devices at home exposes the company to potential interference. For instance, most mobile devices have uncertified applications that can hack into genuine apps. Therefore, allowing the use of personal devices at work and remotely exposes the XYZ company to avoidable distractions.