spk-logo-white-text-short2
0%
1-888-310-4540 (main) / 1-888-707-6150 (support) info@spkaa.com
Select Page

Bringing Your Own Apple Device and Developing a BYOD Policy

Written by Mike Solinap
Published on September 23, 2014

In today’s world, everyone has a mobile device; cell phones, tablets, or a hybrid of the two. In a blog post published on ZDNet in June 2014, Dimensional Research conducted a survey of more than 300 IT leaders, and concluded specifically Apple’s enterprise presence is only growing stronger.

To paint a visual picture the survey reports the following:

  • “60% of respondents support more than 100 Apple devices
  • 29% support 100 to 500 Apple devices
  • In 2011, 67% of companies said that Apple accounted for less than 10% of user devices. In 2014, 68% of companies reporting Apple devices are more than 10 percent of the total
  • 35% of companies say Apple represents 25% or more of user devices
  • User preferences was the primary business reason for supporting Apple
  • 68% of companies expect that Apple devices will increase about 35% over the next 3 years”

Now, what does this mean for businesses in the Enterprise, especially in light of Apple’s recent “celebrity iCloud leak” and “compromised iCloud accounts?” To put it bluntly, CTOs and CIOs must consider security policies at a much higher level than ever before.

Mobile devices of any kind are going to be vulnerable to hackers and, as such, are insecure. This means any data stored on the devices or on the servers for said devices (iCloud, for example) are in a compromising position and are susceptible to theft. From a business perspective, it would be in the best interest of the CIOs and CTOs to ensure necessary security policies are in place to mitigate any kind of sensitive data leaks.

Next Steps:

Latest White Papers

How to Prepare Your Organization for an AI Rollout

How to Prepare Your Organization for an AI Rollout

Managing your organization’s knowledge base may be challenging, especially if information is scattered across multiple systems. Discover how Atlassian’s AI Rovo agents help manage this.What You Will Learn In this eBook you will discover: Why knowledge management...

Related Resources

Reducing CAD File Errors and Rework

Reducing CAD File Errors and Rework

File mistakes and unnecessary rework remain all too common in the engineering space. Inefficient CAD file management due to poor collaboration and hardware limitations can result in missing details or time-consuming corrections. This is why reducing CAD errors is so...

The Cost of Confusion: Streamlining Service Manuals

The Cost of Confusion: Streamlining Service Manuals

While service manuals may seem like just a reference guide, they should be considered part of the product itself.  When service documentation is outdated, inconsistent, or difficult to follow, it leads to costly errors, frustrated customers, and compliance risks. In...

The Role of Managed Services in Scaling Engineering Projects

The Role of Managed Services in Scaling Engineering Projects

Introductions Hi everybody. I'm Michael Roberts, Vice President of Sales and Marketing here at SPK and Associates. And today we're discussing a topic that's shaping the future of product development and engineering. And that's the role of managed services and managed...