Preview

Bring Your Own Risk In BYOD: Article Analysis

Powerful Essays
Open Document
Open Document
934 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Bring Your Own Risk In BYOD: Article Analysis
According to the article “Bring Your Own Risk in BYOD,” the author points out the MDM solutions as well as lessons learned on BYOD implementation. The lessons learned in this article emphasized the security that should be put in place or the measures that organizations need to take in order to operate in a safe and positive environment with BYOD. The Mobile Device Management (MDM) solution, which is part of the Enterprise Mobility Management (EMM), employs solutions to manage risks which allow employees to use their mobile devices to access organizations’ services and data.

Moreover, the article “Maximize Productivity and Minimize Risk with Mobile Management” dives more into the MDM software on personal devices. Concerning MDM, companies need to make sure employees using mobile or personal devices are following the company’s security standards. Millman’s (2017) article found the following:
Mobile Device Management (MDM) suppliers are responding are responding to this with reverse enrolment flows where a user can download the initial
…show more content…
They explain the ethical ethical debates of MDM software on personal devices, discussed the lessons learned from BYOD implementations, as well as the extent of intrusion of a BYOD policy. We learned a great deal of all the sources chosen. For example, there are many benefits in implementing BYOD such as cost saving, health and productivity of employees, as well as new technology implementation. But BYOD implementation does have bottlenecks especially when it comes to MDM software on personal devices. Corporations need to take security measures to ensure their data are protected. Also, from the CIA (Confidentiality, Integrity, and Availability) triad, availability is more supported in the BYOD program whereas Confidentiality and Integrity present some hurdles as it might be challenging to cover these two when it comes to sharing information and who have access to the

You May Also Find These Documents Helpful

  • Better Essays

    Team A is proposing a thorough upgrade to Riordan’s phone and data networks. Our proposal will cover a description of the new system, its components and benefits to Riordan, as well as explain the requirements driving the need for the upgrade. We will cover the information used in the phone and data upgrades and discuss any security and ethical concerns of the system. We will be providing Riordan with diagrams of information flow and system components and business process changes incurred with the implementation of the new system. We will review the web and mobile access elements of the new phone and data networks and how the system will be acquired and maintained. We will discuss the strategic role the system will play in the company and certain requirement driving the projects creation and use. Overall, we will present a compelling and convincing presentation, justifying the costs and changes associated with upgrading Riordan current voice and data networks.…

    • 4597 Words
    • 19 Pages
    Better Essays
  • Best Essays

    “Making Mobile Devices, Cellular Devices More Secure.” (November 8, 2009). Retrieved on September 7, 2012 from…

    • 3710 Words
    • 15 Pages
    Best Essays
  • Good Essays

    “Yet where does this anarchy exist? Where did it ever exist except in the single instance of Shays’ rebellion?” Shays Rebellion was a period of time where farmers stole arms from the government and forcefully took over large areas of land. They rebelled because they were being put in jail for being unable to pay off their taxes. Although many will argue that Shays and his followers were freedom fighters, nevertheless they were irresponsible rebels because they were led under false ideas, many saw them as violent criminals, and they were put in this situation by fault of their own.…

    • 590 Words
    • 3 Pages
    Good Essays
  • Better Essays

    Week 10 Term Paper

    • 3259 Words
    • 10 Pages

    In this term paper, I will assess the effectiveness and efficiency mobile-based applications provide to capture geolocation data and customer data, and quickly upload to processing server without users having to use a desktop system. Next, I will evaluate benefits realized by consumers because of the ability to gain access to their own data via mobile applications. Following the examination the challenges of developing applications that run on mobile devices because of the small screen size. Then I will describe the methods that can be used to decide which platform to support. Afterward I will discuss ways of providing high availability given that a mobile application requires high availability because of end users needing to have continuous access to IT and IS systems. Last but not least, I will discuss methods of making mobile devices more secure, since mobile devices are subjected to hacking at a higher rate than non-mobile devices.…

    • 3259 Words
    • 10 Pages
    Better Essays
  • Best Essays

    Starbucks/Itunes Partnership

    • 4719 Words
    • 19 Pages

    Mobile Technology is expanding daily. It seems to be one of the fastest growing kinds of technologies in the news today. With the advancements in Personal Area Networks (PAN) and Wireless Access Protocols (WPA) mobile devices of today can be developed that are more secure than ever. They can be more accessible than ever before and provide faster and more accurate data transfer. The uses for the mobile devices have begun to expand into more and more areas of daily life. The iPhone mobile phone developed by Apple, Inc. is one of the most popular and bestselling mobile phones on the market today. In order for the iPhone to be at the head of the industry several of the most important technological features are…

    • 4719 Words
    • 19 Pages
    Best Essays
  • Satisfactory Essays

    Effective BYOD Policy

    • 204 Words
    • 1 Page

    Identify which devices are permitted: What works for one organization might not work for others. If at an organization, the employees are provided company Blackberry device and computers for work, it is advised when considering a BYOD it can’t be expected that everyone will have a personal blackberry cell phone. It is feasible when other cell phones like Apple and Android are allowed. There should be specific policies identified for different OS. Since there are so many phone choices in the market.…

    • 204 Words
    • 1 Page
    Satisfactory Essays
  • Satisfactory Essays

    The IT department along other members of the governance committee will need to meet to develop standard protocols, policies and guidelines that clearly communicate the BYOD expectations. Employees need to fully understand that the use of an MDM platform allows FRH to access their device…

    • 433 Words
    • 2 Pages
    Satisfactory Essays
  • Better Essays

    Increasing its security may include purchasing programs such as Absolute Software, which would allow the company to remotely wipe devices. Since employees may use more than one personal device on the job, the company will have to account the cost of the software for about 250 devices, the software costs about $100 dollars each; which would add up to $2,500. Also, SHHC may want to create a separate body in their organization that will monitor the devices. This body will help enforce the company’s new BYOD policy, by for example making sure that all the devices are protected and that the data on those devices are encrypted. It will also be responsible of locating the lost devices, remotely wiping the data on them, or even monitor the traffic emitted by the devices. Creating this completely different sector in the organization will have a cost that will amount to about $5,500 or $8,000 total. Due to these measures, the Annual Rate of Occurrence is expected to drop by 3%, making the residual annual risk to be of 7%. If we add the $8,000 to the $375,000, it will create the new SLE of $383,000. Therefore, the new ALE will be of $26,810. This would reduce the costs from the initial risk by $10,690 if an event were to…

    • 1967 Words
    • 8 Pages
    Better Essays
  • Powerful Essays

    Ever since the introduction of the first mobile computer device, there has been a growing need and want for more and more mobile computing devices. Once users got the first taste of harnessing the power of the mobile device that was all they needed. Today, you cannot walk down any public road or walk into a public building without seeing users talking and connecting to the internet via mobile devices.…

    • 3826 Words
    • 16 Pages
    Powerful Essays
  • Satisfactory Essays

    Fire Truck Crash

    • 318 Words
    • 2 Pages

    The consequences of losing a smartphone or other mobile device are significant because these devices store personal and business data. The goal, therefore, for mobile devices users is to make their…

    • 318 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    This article provides a comprehensive analysis of the current shape of the mobile market and increased security concerns…

    • 781 Words
    • 4 Pages
    Good Essays
  • Good Essays

    Current Event

    • 670 Words
    • 3 Pages

    More than 90 percent of American adults own a mobile phone, and more than half of the devices are smartphones. But “smartphone” is a misnomer. They are personal computers that happen to include a phone function, and like any computer they can store or wirelessly retrieve enormous amounts of personal information: emails, photos and videos; document files; financial and medical records; and virtually everywhere a person has been.…

    • 670 Words
    • 3 Pages
    Good Essays
  • Powerful Essays

    Byod

    • 3852 Words
    • 16 Pages

    “Bring Your Own Device” (BYOD) Initiatives Enable Clinical Transformation ....................................1 Physicians are Eager to Use Mobile Solutions at the Point of Care ..................................................1 Hospital IT Faces Significant Challenges to Support Mobile Solutions ............................................2 Hospital IT Requires Next-Generation Networking Management Solutions to Support BYOD ........3 Customer Story: Henry Ford Health System ......................................................................................5 Customer Story: Western Maryland Regional Medical Center .........................................................6 Conclusion .........................................................................................................................................7 For Additional Information ..................................................................................................................7…

    • 3852 Words
    • 16 Pages
    Powerful Essays
  • Powerful Essays

    Mobile Computing

    • 1913 Words
    • 8 Pages

    Mobile computing has become a fixture in our everyday lives. As of today, people throughout the world can use their mobile devices to do anything that they would normally do on a laptop or a personal computer. At this point, there are no foreseeable bounds where mobile technology is concern. The healthcare industry is now realizing this fact and has decided to implement mobile technology within their industry. While still in the early stages of implementing mobile technology within the healthcare industry, there are many things to consider, and questions to ask. Within this paper, I will answer such questions as patient information accuracy, security issues, advantages and disadvantages of using a mobile device and the impact the social media has within the healthcare industry.…

    • 1913 Words
    • 8 Pages
    Powerful Essays
  • Better Essays

    Mis on Your Pocket

    • 1979 Words
    • 8 Pages

    The kinds of applications that are described in this case study are as simple as e-mail, calendar, photo sharing, and text messaging applications to applications like the one used for MEDITECH electronic medical records system, Epocrates Essentials, ChainLinq Mobile, and the app developed by Timothy Childs to help control machines in his business. These types of applications help employees stay better kept up with each other and business information. The e-mail application allows employees to receive e-mails almost directly after they are sent. The MEDITECH application gives doctors the ability to look at things like medical records and results whenever they need to and where ever they are. Also being able to access applications like Epocrates Essentials helps them understand the results and get more medical information. Basically, all the applications described help support business functions like timeliness and punctuality. These application help improve operational efficiency because they improve the speed of the information being communicated in businesses. This allows the businesses to operate faster and helps decision-making be done quicker which will help companies avoid potential problems or fix problems that are happening faster.…

    • 1979 Words
    • 8 Pages
    Better Essays