June 16, 2015, by
Posted in Enterprise, Mobile Business, Thought Leadership

shutterstock_245363377 (1)

This month marks eight years since Apple first released its revolutionary iPhone. Following its explosive uptake in the market, a series of high performing & power packed smartphones soon made their way into enterprises after employees began to demand to use their new smart devices over outdated corporate-issued phones.

As a result, organizations that never allowed the use of personal devices in the workplace started permitting employees to bring their own devices to access enterprise applications and content– also known as BYOD (Bring-Your-Own-Device). Though many organizations embraced BYOD to reduce company costs on corporate owned-devices and improve the user experience for employees, it has also triggered security risks that endanger the privacy and security of company information.

Although not new, the security challenges only seem to be growing. Let’s discuss current BYOD challenges and explain how Thru can help enterprises get the best of both worlds.

Some common BYOD challenges for enterprises are:

Privacy of Company Data

According to Gartner, “Already, over 60% of workers report using a personal device at least once a day in their work; 44% use a personal smartphone in their job.” This sets off security as a top concern for CIOs. Permitting employees to access company data from personal devices is a daily challenge for IT departments. Since employees use their smartphones and tablets daily to access third party apps like online games, social networking sites, etc., they face a high chance of downloading malware that can infect their devices. If an employee has company data saved on an infected device that data remains at risk of being leaked or retrieved by malicious programs.

Consumer File Storage Applications

Along with the iPhone’s popularity came the widespread use of consumer file storage applications that could be quickly downloaded for no cost from online app stores. These apps became popular because they gave employees an easy way to store photos, music and personal documents in the cloud. Because these apps are easy to use, many employees started using these apps at work to bypass email file size restrictions and to always have their files with them on-the-go. This has become a problem for IT departments because the data stored in these apps is isolated from IT management and is not guaranteed to be protected with features such as encryption that keep data from unauthorized access.

Lost or Stolen Devices

According to a 2014 report from the FCC (Federal Communications Commission) on stolen devices, more than 1 million smartphones are stolen each year. Whether employee devices are lost or stolen, enterprises with a BYOD policy must ensure that it can protect company data that is stored on employee devices. The enterprise applications that employees use to access data should have security features such as remote wipe that empower IT administrators to delete data off missing or stolen devices.

Thru: An Ideal BYOD Solution for Enterprises

What enterprises need in order to solve these challenges are mobile technologies that guarantee the security of company data and give employees free rein to work from anywhere, or any device.
Thru’s enterprise file sharing and collaboration solution is a pivotal example of a secure BYOD solution. With Thru, employees can sync and share files with any corporate-issued or employee-owned device while giving IT departments complete visibility and control of user actions. To help enterprises with the challenges of malware, consumer file storage and lost or stolen devices, Thru’s secure file sharing solution ensures complete end to end protection with antivirus scanning, comprehensive encryption and remote wipe functionality.
Largely influenced by the iPhone’s popularity, the mobile workforce today is still growing with momentous acceleration. CIOs and IT Directors must evaluate the BYOD needs of their organization and evaluate the best solutions like Thru that ensure the most secure BYOD policy as possible.

Share your thoughts and ideas in the comments below!

Learn more about Thru for secure mobile file sharing