We’ve all been there. First day on the job and you’re sailing through the on-boarding process until you get to the IT and security portion. Before you know it, your phone has five new apps installed on it –- most of them you never knew existed until now. Every time you need to log into your e-mail, a specific website, or program, you’re bombarded with 2-step verifications codes, 6-number passcodes, PIN numbers, and random character password generators.

See also: Mobile Devices Will Be Biggest Business Security Threat in 2014

Going through all those extra security steps not only burn up precious minutes in the office, especially if you don’t get the password right the first time, but can also contribute to grey hairs. And don’t get people started on the struggle of working remotely –- the absolute worst.

Employees are over intense security around devices

A recent survey by Forrester taken with more than 1,000 North American and European employees, focusing on the State of Enterprise Mobile Security, yielded some eye-opening results.

There is incipient rebellion against more intense office computing security. 53% of employees consider their company’s mobile device security a nuisance. 39% of these employees are more interested in finding their own way around security walls, but would welcome corporate guidance to a more feasible and less time-consuming alternative.

Kind of a pain, workers say. Image: Mashable composite. iStockphoto duckycards, Mashable

The barrier between work use and personal use has vanished

Now more than ever, employees are seldom using separate mobiles device for business and personal use. 61% percent of North Americans and European corporate workers are choosing to use their own personal smartphones for work, and 56% of those workers are doing the same thing with tablets.

The waiting game

According to Forrester’s report, 40% of people who use a tablet or smartphone have paid for at least one business app on their own dime.

As more companies shift gears toward bulking up security walls to protect their sensitive information, some employees are taking matters into their own hands. Instead of waiting around for IT to undergo the time consuming process of finding a potential security app, testing it out, finalizing budgets and pushing it out to the rest of the company, employees are doing the work themselves.

How beneficial is mobile security, really?

According to Forrester’s Business Technology survey data, the sensitive information employees are accessing whether it be customer information, intellectual property or corporate strategy are more susceptible to being breached when accessed from their mobile devices. 22% of information breaches involved lost or stolen mobile devices.

Putting theft aside, within the past year, there has been an overwhelming increase of security hacks and leaked information all over the world. Within the past year, we’ve seen how devastating hackers can be when they infiltrate finicky security walls. Companies like: Dairy Queen, Kmart, Pacnet, Sony, Snapchat, and Target dealt with hackers from hell.

If you can’t beat ‘em, join ‘em

So where does this leave employees? How can companies protect their data on devices they don’t own? Does that mean the installation of watching devices that track your every move on your personal device until a consolidated solution comes along?

According Foster’s report, 34% of telecomm decision makers view the implementation of a BYOD program within the next year as a high priority. Corporate tech giants like Apple and Google are already feverishly working toward a grand solution to the adoption of corporate data protection and personal software.

In Forrester’s study, 84% of enterprise telecommunication decision-makers provide support for email, contacts, and calendar apps on the iPhone. 86% support Android devices. Some companies are experimenting with work friendly programs such as Google’s Android for Work to see if it’s a viable option.

At the end of the day, there are pros and cons to each situation no matter what companies decide. In the meantime, mentally prepare yourself for more layered, comprehensive, and in-depth security that may require more than just two steps.