Search Results

The Millennials are filling up the workplace with new habits, preferences and expectations of technology. What do these new ways of working mean for company policy and security?

Corporate IT managers are faced with the challenge of finding ways to accommodate the shifting mobility landscape – where home technology tends to exceed that used at work – without creating vulnerabilities for company data.


In the shadows

For many Millennials, also known as Generation Y and born between 1981 – 2000, BYOD (or bring your own device) is the default way of working. If they are coming directly from a university environment they will be used to working on a mixture of personal devices, university-owned IT and cloud storage. In essence they use whatever tools will get the job done which, while being a bonus for productivity, causes havoc for IT departments trying to keep sensitive data within their own control.

These activities, which occur out of sight of the IT department, are often collectively referred to as ‘shadow IT’. This could include sending files via personal web accounts, making use of consumer storage services or taking documents out of the building on a personal hard drive, leaving no trace.

Combatting this problem can be difficult for companies committed to restricting employees to corporate-owned devices. Restrictive policies are likely to discourage Millennials, who will seek more freedom and flexibility elsewhere and even with the strictest policies there are likely to still be regular infringements from staff who feel overly constrained. Within the 21-32 year old age group, 12 per cent admit to storing work passwords using personal cloud based accounts, 16 per cent admit to doing the same with financial information, 22 per cent with critical private documents such as contracts and business plans and 33 per cent to storing customer data1.


Embrace the change

One of the most effective ways of dealing with this is by implementing a secure BYOD or Choose Your Own Device (CYOD) policy. Giving your staff the freedom to work from their own devices in a secure way can alleviate many of the frustrations felt by employees who feel tethered to out of date technology while protecting the interests of the business.

BYOD doesn’t have to mean handing over all control and responsibility to the users and nor does it have to lead to extra work for already stretched IT resources. Using the correct device management software will enable IT managers to get secure access to employees' smartphones and tablets, monitor use and even update security settings over the air. BYOD also brings extra benefits for data protection as users have usually invested their own funds into the device, they have a vested interest in keeping it safe, leading to fewer ‘left on train’ incidents.

Far from viewing this shift as a threat, businesses should be looking at Millennial ways of working as an opportunity to support greater productivity and pave the way for flexible working practices that boost employee satisfaction. All that’s needed is the right strategy, technology and policies with security at the heart.

main_icn_24_7_support24-delivery 360-view4gmain_icn_Accessoriesmain_icn_Appsapple market_icn_Batterybroadband-devicecalendarmarket_icn_Minutesmain_icn_Cameramain_icn_Chatmain_icn_Chevron_downmain_icn_Chevron_leftmain_icn_Chevron_rightmain_icn_Chevron_upmain_icn_Tick_simpleClose_thick_0.1main_icn_Closecommunity-thin main_icn_Community_or_Foundationdashboard-hidashboard-thin main_icn_Dashboardmarket_icn_Data_Sharingmarket_icn_Dealsmain_icn_Deletemain_icn_Deliverymain_icn_Dislikemain_icn_Downloadmain_icn_Editerror-circlefacebook-thin main_icn_Social_Facebookmain_icn_Filtermain_icn_Filtergogoogle-plus-thin social-google-plushelp-hi_1helpmain_icn_Likemarket_icn_LinkedInlocation-hilocation-regular location-thin main_icn_Locationmail-newmarket_icn_Screen_sizemain_icn_Menumarket_icn_SMSmobile-broadbandmain_icn_Mobilemain_icn_My_Vodafonenetwork-signal-hinetwork-thin main_icn_Network_signalmain_icn_Pausemain_icn_PAYGsocial-paypalmain_icn_Photospin_alertpin_manpin_warningplay-circle main_icn_Play_circlemain_icn_Play_arrowmain_icn_Add_or_Plus0_rating5_ratingrating-filled ratingmain_icn_Ratingsrefresh main_icn_Bill_or_Reportmain_icn_Reportsmain_icn_Roamingmain_icn_Searchmain_icn_Securityshareshoppingmarket_icn_SIM_Swapmain_icn_Social_Twitterspeech-bubble main_icn_Studenttail [Converted]technology test_app main_icn_Texttick-bordered tick-simple main_icn_Tick_simplemain_icn_Top_upmain_icn_TVtwitter-thin main_icn_Social_Twitterusersmain_icn_Viewedmarket_icn_Vodafone_storeWarning_0.1warningweightwindow market_icn_Multinationalyoutube-thin social-youtube