The popularity of powerful technology products designed for consumers, such as mobile phones and tablets, in addition to the abundance of free or inexpensive apps for these devices, have contributed to the growth of the following BYO information technology trends:

BYOA Bring Your Own App is the trend toward employee use of third-party cloud application services in the workplace. Like it or not, employees are accessing the cloud apps they use on their personal devices at work. Popular consumer apps that are being used for business include Dropbox and Google Docs. As employee-owned technologies encroach upon the corporate network, security becomes increasingly more problematic.

BYOD Bring Your Own Device is the trend that allows employees in an organization to use their personally owned devices for work-related activities. Mobile phones are the most popular device an employee might use at work, but employees also utilize their own tablets, laptops, and USB drives in the workplace. With the rise in security breaches, personal devices are becoming a huge target of cybercriminals.

BYOIBring Your Own Identity is the trend toward digital authentication in which an end user’s username and password is managed by a third party. This is popularly used for website authentication. Instead of requiring visitors to create a new username and password during the registration process, the website allows visitors to use their existing social identities such as Facebook, Twitter, LinkedIn, or Amazon to log in. Adversaries warn that BYOI has too many risks, including the potential for compromised identities and identity theft.

BYONBring Your Own Network is the trend toward giving end users the ability to create or access alternative networks when the available options are not satisfactory for their purposes. In some organizations, employees bring their own networks to access social media or shopping websites blocked by administrators. Employees often stay connected to the network they have created and log into corporate applications, which can cause problems as potentially sensitive corporate information can be exposed.

Up your game and stay up to date with our Guide to Using Autotask to Track Wins.

Tags: