In the United States, 35% of employees are now contractors or freelancers. And according to the U.S. Bureau of Labor Statistics, the average length of time a person stays at one company decreased from 4.6 years in 2014 to 4.2 years in 2016. In an age of increasing short-term employment, it doesn’t always make sense to give employees access to company devices. Often it’s quicker and easier for them to work on their own laptops, tablets, or smartphones. But BYOD (bring your own device) policies pose significant security risks from various mobile security threats. How should IT teams adapt? The challenges of IAM in a BYOD environment BYOD workplaces have to deal with a unique set of security concerns. In addition to all the regular IAM/UAM tasks, IT teams need to: Onboarding personal devices by automating the configuration of security settings, email, WiFI and VPN. Secure and control.