Feeds

BYOD is a PITA: Employee devices cost firms £61 a month

Report: Is making workers pay a false economy?

Choosing a cloud hosting partner with confidence

Companies are paying £61 a month for every device their workers bring into the office, but less than half of IT departments have any say in mobile strategy these days.

The numbers come from biz Wi-Fi flogger iPass, which discovered that only 48 per cent of IT departments are still in control of the spending on mobile devices, down from 52 per cent last year. But while they might not be buying the devices, the companies are still paying for the connectivity with an average monthly bill of £61.

That's a global average, costs to US firms were higher given the cost of mobile data, but it's still a lot of money to be spending in connecting devices over which corporate IT has little control.

More than half of the companies surveyed (56 per cent) have relaxed their BYOD (Bring Your Own Device) policies within the last 12 months, and more than eighty per cent now permit employees to pay for their own hardware for use at work.

Security is a concern, with all these unregulated devices, but management is the thing staff are most concerned about. Provisioning and supporting devices is expensive, and most of those polled reckon the costs are only going to rise. The majority of security incidents were down to handsets that were lost or stolen complete with passwords and logon details.

Various companies will address this, BlackBerry (aka RIM) has its Enterprise Service for managing devices including its own kit, and earlier this week Sophos updated its Mobile Control to version 3, offering lots of phishing and malware protection as well as device management, but that can prove expensive even if companies aren't paying for the kit any more.

MobileIron is another company in the field, which is why it worked with iPass to poll the 477 "IT Professionals" who took part in the survey, the results of which are compiled into an annual report with plenty of pretty graphics (free, but email address required).

It's not hard to see an analogy with the early days of the Personal Computer, when a desktop PC would be slipped through a departmental budget (generally as Stationery Supplies) to bypass the IT department entirely. PCs eventually came under the sysadmin's thumb, so it might be safe to assume that mobile devices will eventually succumb in the same way. The only question now is how much damage will be done in the meantime. ®

Protecting users from Firesheep and other Sidejacking attacks with SSL

More from The Register

next story
Phones 4u slips into administration after EE cuts ties with Brit mobe retailer
More than 5,500 jobs could be axed if rescue mission fails
JINGS! Microsoft Bing called Scots indyref RIGHT!
Redmond sporran metrics get one in the ten ring
Driving with an Apple Watch could land you with a £100 FINE
Bad news for tech-addicted fanbois behind the wheel
Murdoch to Europe: Inflict MORE PAIN on Google, please
'Platform for piracy' must be punished, or it'll kill us in FIVE YEARS
Phones 4u website DIES as wounded mobe retailer struggles to stay above water
Founder blames 'ruthless network partners' for implosion
Found inside ISIS terror chap's laptop: CELINE DION tunes
REPORT: Stash of terrorist material found in Syria Dell box
Sony says year's losses will be FOUR TIMES DEEPER than thought
Losses of more than $2 BILLION loom over troubled Japanese corp
prev story

Whitepapers

Providing a secure and efficient Helpdesk
A single remote control platform for user support is be key to providing an efficient helpdesk. Retain full control over the way in which screen and keystroke data is transmitted.
WIN a very cool portable ZX Spectrum
Win a one-off portable Spectrum built by legendary hardware hacker Ben Heck
Saudi Petroleum chooses Tegile storage solution
A storage solution that addresses company growth and performance for business-critical applications of caseware archive and search along with other key operational systems.
Protecting users from Firesheep and other Sidejacking attacks with SSL
Discussing the vulnerabilities inherent in Wi-Fi networks, and how using TLS/SSL for your entire site will assure security.
Security for virtualized datacentres
Legacy security solutions are inefficient due to the architectural differences between physical and virtual environments.