• United States



Introducing BYOD for You: The Guide for Employees Who Bring Their Own Smartphone

Apr 16, 20134 mins
IT JobsMobile Security

I am introducing my new eBook called BYOD for You: The Guide to Bring Your Own Device to Work.

In my last CSO Magazine blog, I made the case that BYOD is the New WiFi. I finished that blog by asking readers to: “Please come back and help be a part of the BYOD solution for your customers.”

As described in that blog, security professionals cannot keep saying “no” to BYOD. My firm belief is that security professionals must do more than just mandate policies and enforce decrees. We need to look at reality and meet our customers in their current situation. We need to take off our blinders and understand the facts regarding what staff are actually doing with their personal devices at work.

Over the past year, I’ve struggled with this BYOD reality that exists in workplaces around the world. I’ve read numerous survey results and analyzed the BYOD data. I decided to take a position on this topic and try and advance this topic rather than just repeat what others are saying about BYOD.

What did I decide to do? What is my promised announcement?

In part 2 on this BYOD topic, I am introducing my new eBook called BYOD for You: The Guide to Bring Your Own Device to Work.

What’s my purpose? To offer options to improve security and privacy and help the end user answer their practical questions.

The specific details on the eBook, as well the free introduction, can be found at the “BYOD for You” book website:

Why did I write a book on BYOD for end users or the average employee? 

There are plenty of technical articles, books and white papers on BYOD for enterprises architects, security geeks, technology experts or others who implement policies for large enterprises. However, this is the first book that I know of that is written specifically for the employees who own the device. I wanted to take a different perspective and offer options for whatever situation the reader is currently in – from a novice employee who quietly brings their own device to work to a smartphone guru who has been bringing their own device for a while.

What topics does the eBook cover?

After explaining some basic terms and concepts involved in bringing your own device to work, I cover the top areas that need to be thought through before an employee brings their own smartphone, tablet or other personal device to work. The topics include: assessing your own environment, work policies, security, privacy, mobile device management (MDM), financial aspects (show me the money), ethical considerations and how to develop your own personal BYOD plan.

How can you possibly provide advice for such a wide divergence in policies and end user work situations?

You can’t possible address every situation or issue. I decided to create three different levels that I call “gold, silver and bronze options” for each particular topic. Recent surveys suggest that the majority of employees who currently bring their own device to work do not have (or are not aware of) their employer’s policy regarding BYOD. These end users have taken matters into their own hands in order to gain efficiency, ease of use or other personal and professional benefits. Typically, these staff feel as if they are on their own regarding security, privacy and other aspects of BYOD. The bronze options offer advice to this group in each critical area.

On the other extreme, the gold options are available to employees who work for companies with strong BYOD policies, full mobile device management technology (MDM) in place, financial incentives to bring their own device to work and good training available to BYOD adopters.

Any final thoughts on the book?

We will need improvements in MDM technology, new mobile device hypervisors and more. But most of all, technology and security pros need to embrace BYOD today and become part of the solution to existing BYOD problems at home and work. Answers must include people, process and technology changes. Security pros need to engage our customers on the future workplace environment.

I’d love to hear your thoughts on BYOD. Should security professionals embrace BYOD or fight it? You can engage this BYOD topic in social media in the following ways:



MENTION US: @byod4u #byod4u


BUY the book:


Daniel J. Lohrmann is an internationally recognized cybersecurity leader, technologist and author. During his distinguished career, Dan has served global organizations in the public and private sectors in a variety of executive leadership capacities, including enterprise-wide Chief Security Officer (CSO), Chief Technology Officer (CTO) and Chief Information Security Officer (CISO) roles in Michigan State Government. Dan was named: "CSO of the Year," "Public Official of the Year," and a Computerworld "Premier 100 IT Leader." Dan is the co-author of the Wiley book, “Cyber Mayday and the Day After: A Leader’s Guide to Preparing, Managing and Recovering From Inevitable Business Disruptions.” Dan Lohrmann joined Presidio in November 2021 as an advisory CISO supporting mainly public sector clients. He formerly served as the Chief Strategist and Chief Security Officer for Security Mentor, Inc. Dan started his career at the National Security Agency (NSA). He worked for three years in England as a senior network engineer for Lockheed Martin (formerly Loral Aerospace) and for four years as a technical director for ManTech International in a US / UK military facility. Lohrmann is on the advisory board for four university information assurance (IA) programs, including Norwich University, University of Detroit Mercy (UDM), Valparaiso University and Walsh College. Earlier in his career he authored two books - Virtual Integrity: Faithfully Navigating the Brave New Web and BYOD For You: The Guide to Bring Your Own Device to Work. Mr. Lohrmann holds a Master's Degree in Computer Science (CS) from Johns Hopkins University in Baltimore, Maryland, and a Bachelor's Degree in CS from Valparaiso University in Indiana.

More from this author