I am introducing my new eBook called BYOD for You: The Guide to Bring Your Own Device to Work. In my last CSO Magazine blog, I made the case that BYOD is the New WiFi. I finished that blog by asking readers to: “Please come back and help be a part of the BYOD solution for your customers.” As described in that blog, security professionals cannot keep saying “no” to BYOD. My firm belief is that security professionals must do more than just mandate policies and enforce decrees. We need to look at reality and meet our customers in their current situation. We need to take off our blinders and understand the facts regarding what staff are actually doing with their personal devices at work. Over the past year, I’ve struggled with this BYOD reality that exists in workplaces around the world. I’ve read numerous survey results and analyzed the BYOD data. I decided to take a position on this topic and try and advance this topic rather than just repeat what others are saying about BYOD. What did I decide to do? What is my promised announcement? In part 2 on this BYOD topic, I am introducing my new eBook called BYOD for You: The Guide to Bring Your Own Device to Work. What’s my purpose? To offer options to improve security and privacy and help the end user answer their practical questions. The specific details on the eBook, as well the free introduction, can be found at the “BYOD for You” book website: www.byod4u.com Why did I write a book on BYOD for end users or the average employee? There are plenty of technical articles, books and white papers on BYOD for enterprises architects, security geeks, technology experts or others who implement policies for large enterprises. However, this is the first book that I know of that is written specifically for the employees who own the device. I wanted to take a different perspective and offer options for whatever situation the reader is currently in – from a novice employee who quietly brings their own device to work to a smartphone guru who has been bringing their own device for a while. What topics does the eBook cover? After explaining some basic terms and concepts involved in bringing your own device to work, I cover the top areas that need to be thought through before an employee brings their own smartphone, tablet or other personal device to work. The topics include: assessing your own environment, work policies, security, privacy, mobile device management (MDM), financial aspects (show me the money), ethical considerations and how to develop your own personal BYOD plan. How can you possibly provide advice for such a wide divergence in policies and end user work situations? You can’t possible address every situation or issue. I decided to create three different levels that I call “gold, silver and bronze options” for each particular topic. Recent surveys suggest that the majority of employees who currently bring their own device to work do not have (or are not aware of) their employer’s policy regarding BYOD. These end users have taken matters into their own hands in order to gain efficiency, ease of use or other personal and professional benefits. Typically, these staff feel as if they are on their own regarding security, privacy and other aspects of BYOD. The bronze options offer advice to this group in each critical area. On the other extreme, the gold options are available to employees who work for companies with strong BYOD policies, full mobile device management technology (MDM) in place, financial incentives to bring their own device to work and good training available to BYOD adopters. Any final thoughts on the book? We will need improvements in MDM technology, new mobile device hypervisors and more. But most of all, technology and security pros need to embrace BYOD today and become part of the solution to existing BYOD problems at home and work. Answers must include people, process and technology changes. Security pros need to engage our customers on the future workplace environment. I’d love to hear your thoughts on BYOD. Should security professionals embrace BYOD or fight it? You can engage this BYOD topic in social media in the following ways: LIKE US: facebook.com/byod4u FOLLOW US: twitter.com/byod4u MENTION US: @byod4u #byod4u VISIT US: byod4u.com amazon.com/dp/B00C8WEV4Y BUY the book: Related content opinion 3 security career lessons from 'Back to the Future' You don't need to be able to predict the future to have a successful security career, but you had darned well better be able to learn from the past. By Dan Lohrmann Jan 12, 2021 6 mins Careers Security interview Secrets of industry-hopping CSOs Who says you can't change industries? Veteran security leaders Mark Weatherford and Cheri McGuire teach you how it’s done. By Dan Lohrmann Mar 02, 2020 12 mins Careers Security opinion Why security pros are addicted to FUD and what you can do about it Despite professing anti-FUD rhetoric, cyber experts fan the flames, breathlessly sharing the details of the latest data breaches. It's a risky addiction that can lead to security apathy in enterprises. Here's how to harness it. By Dan Lohrmann Sep 06, 2018 7 mins Security opinion Bridging the smart cities security divide There are plenty of organizations that seem to be working on answers to secure smart cities, but in many ways it's like the early days of cloud computing with everyone building their own solutions. By Dan Lohrmann Feb 01, 2018 6 mins Internet of Things Security Podcasts Videos Resources Events SUBSCRIBE TO OUR NEWSLETTER From our editors straight to your inbox Get started by entering your email address below. Please enter a valid email address Subscribe