Preview

Byod Pro's and Con's

Powerful Essays
Open Document
Open Document
2327 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Byod Pro's and Con's
Bring Your Own Device

(Cons)

Bring Your Own device is a business policy of employees bringing personally owned mobile devices to work and using those devices to access privileged company resources like email, file servers and databases as well as personal applications and data. The types of devices that employees may use are smart cell phones and laptops.
The reality is that there is no simple solution when it comes to regulating BYOD. Every organization is different and there are number of different factors that have to be taken into consideration. First a company will have to decide which employees will be allowed access, as well as the types of devices they are going to support. “Forrester Research reported in July of 2011 that nearly 60 percent of companies allow employees to use personal devices for work. “Bring Your Own Device (BYOD)” policies allow employees maximum choice and flexibility but raise new challenges in maintaining the personal privacy of the user, managing and securing valuable corporate information assets, and providing IT with an unpredictable and inconsistent mobile environment. There are also mobile technology considerations, while mobile devices are surpassing PCs and laptops as a user’s primary computing platform, they do have limited access to power, network and hardware resources. Devising a BYOD solution that will support both personal and business roles requires attention to all of these challenges”. The paper will be to identify most of the risks associated with companies allowing personal devices in the work place to access company information. I will also demonstrate the downside of the BYOD policy and the affects to the company and the employee. There are numerous risks associated with the BYOD policy many of them are security related the loss or theft of a mobile phone could lead to confidential data being stolen and



Cited: The BYOD Conundrum." Web log post. SecurityInfoWatch.com. N.p., n.d. Web. 09 Dec. 2012. Benigno, Richard. "10 Tips for Implementing BYOD Securely." N.p., 08 Sept. 2012. Web. 09 Dec. 2012. Berkowitz, Philip. "Corporate Counsel." Corporate Counsel. N.p., 26 July 2012. Web. 09 Dec. 2012. Messmer, Ellen. "BYOD-resistance Loosening but Security Practices Lacking."Consumerization of IT, BYOD. N.p., 25 Oct. 2012. Web. 09 Dec. 2012. Savitz, Eric. "Developing A BYOD Strategy: The 5 Mistakes To Avoid." Forbes. Forbes Magazine, 27 Mar. 2012. Web. 07 Dec. 2012. Courbanou, Dave. "Dell, Intel: BYOD Is Productivity Powerhouse | Channelnomics."Channelnomics RSS. N.p., n.d. Web. 07 Dec. 2012.

You May Also Find These Documents Helpful

  • Satisfactory Essays

    NT2580 Project Part 1

    • 348 Words
    • 1 Page

    Access to the company network will be secured by multiple firewalls set up with our routers. Firewall filters will be set up with a specific list of allowed users and programs. All other traffic will be blocked by default until it has been approved by IT. There will be a limited number of wireless access points around the building, with password access. These passwords will be changed on a regular basis. Access to the local network will be secured by user authentication passwords. Users will be limited to only the system resources that they absolutely need to complete their work. Users’ passwords must be changed every 90 days.…

    • 348 Words
    • 1 Page
    Satisfactory Essays
  • Satisfactory Essays

    Agree to proper use of their devices when working with company data both on-site and off-site…

    • 319 Words
    • 2 Pages
    Satisfactory Essays
  • Better Essays

    It255 Project Part 1

    • 634 Words
    • 3 Pages

    References: David Kim., and Michael G. Solomon. Fundamentals of Information Systems Security , 2012: Sudbury, MA 2012…

    • 634 Words
    • 3 Pages
    Better Essays
  • Good Essays

    References: Kim, D., & Solomon, M. G. (2012). Fundamentals of Information Systems SecuritY. Sudbury: Jones & Bartlett Learning.…

    • 651 Words
    • 3 Pages
    Good Essays
  • Good Essays

    The network administrator and the network security administrator need to be aware of these types of products and how they can be used to create low-cost covert networks in the workplace. The administrators need to be aware of the push-to-talk feature on cell phones and understand, for example, that sensitive documents can be leaked by the use of cell phone cameras. The administrators not only need to be aware of these technologies, but they need to update their policies and procedures so they can take legal action against employees who leak information.…

    • 11068 Words
    • 45 Pages
    Good Essays
  • Satisfactory Essays

    Nt1310 Unit 3

    • 697 Words
    • 3 Pages

    Security- Network management does not have control over the content on employee’s phones. If there is malicious malware or other things on their phone it can spread to the company’s network and cause problems. Not to mention that there are sites that are probably blocked by your company that can be circumvented by using apps on the phone to get to.…

    • 697 Words
    • 3 Pages
    Satisfactory Essays
  • Better Essays

    Cmgt 400 Week 2

    • 1100 Words
    • 3 Pages

    Conklin, A., White, G., Williams, D., Davis, R., & Cothren, C. (2012). Principles of Computer Security: CompTIA Security+ and Beyond (Exam SY0-301) (3rd ed.). New York, NY: McGraw-Hill Company.…

    • 1100 Words
    • 3 Pages
    Better Essays
  • Powerful Essays

    9/11 and Airport Security

    • 3569 Words
    • 15 Pages

    McClure, George. "IEEE-USA Today 's Engineer." 02.12 Ieee-usa Today 's Engineer. 2007. Web. 21 Feb. 2012. http://www.todaysengineer.org/2005/Jun/security.asp…

    • 3569 Words
    • 15 Pages
    Powerful Essays
  • Satisfactory Essays

    Effective BYOD Policy

    • 204 Words
    • 1 Page

    Identify which devices are permitted: What works for one organization might not work for others. If at an organization, the employees are provided company Blackberry device and computers for work, it is advised when considering a BYOD it can’t be expected that everyone will have a personal blackberry cell phone. It is feasible when other cell phones like Apple and Android are allowed. There should be specific policies identified for different OS. Since there are so many phone choices in the market.…

    • 204 Words
    • 1 Page
    Satisfactory Essays
  • Better Essays

    For the past couple of years, a policy that allows employees to bring their own personal devices to work has become progressively popular. This policy is known as BYOD, an acronym that stands for “bring your own device”. One of the main reasons for the growing usage of the policy is the increase in employee productivity as they are already familiar with the equipment they are using at work. Although this reliance on technology is efficient and produces numerous benefits in the business sector, it also brings several problems along with it. Certainly, the risk of losing valuable data has become an imposing threat nowadays, making…

    • 1967 Words
    • 8 Pages
    Better Essays
  • Good Essays

    Term Limits In Congress

    • 841 Words
    • 4 Pages

    Many Americans today are displeased with and have expressed their discontent with the lawmaking actions—or the lack thereof, rather—of members of Congress. However, solutions to resolve, or at least improve, public approval of their congressional representatives are unclear and plagued by some of the following questions: are term limits the answer, will they do more harm than good, and is it just a trade-off for different, yet equally adverse issues?…

    • 841 Words
    • 4 Pages
    Good Essays
  • Satisfactory Essays

    Unit 4 Assignment 2

    • 1005 Words
    • 5 Pages

    The use of company-owned computing devices and networks is a privilege, instead of a right, and inappropriate use can result in revocation of such privilege. Employees must remember that their behaviors represent the actions of the company, and the respect to the rights of others and all relevant laws, regulations and contracts. Employees also must be aware of that their inappropriate uses may lead to catastrophic results on the company and other employees. This acceptable use policy grants the right for users to gain access to the network of Richman Investments and also binds the said user to follow and abide accordingly to the agreements set forth for network access provided below.…

    • 1005 Words
    • 5 Pages
    Satisfactory Essays
  • Best Essays

    http://www.cio.com/article/706560/7_Tips_for_Establishing_a_Successful_BYOD_Poli y. Kaneshige, T . (March 06, 2012). BYOD: Making Sense of the Work-Personal Device Blur. In CIO.com. Retrieved , from http://www.cio.com/article/701545/BYOD_Making_Sense_of_the_Work_Personal_De ce_Blur. Kenneth Corbin. (August 23, 2012). BYOD Security Demands Mobile Data Protection Strategy. In CIO.com. Retrieved , from http://www.cio.com/article/714550/BYOD_Security_Demands_Mobile_Data_Protecti n_Strategy. Lundblad, J. (2003). A review and critique of rogers ' diffusion of innovation theory as it applies to organizations.Organization Development Journal, 21(4), 50-64. Retrieved from http://search.proquest.com/docview/197971687?accountid=7113 Miller, K., Voas, J., Hurlburt, G. (2012). BYOD: Security and Privacy Considerations. IT Professionals. 14 (5), 53-55. Retrieved from http://ieeexplore.ieee.org Mark Pendleton. (August 13, 2012). Top Concerns When Creating a BYOD Policy. In NEC Corporation of America. Retrieved , from http://info.necunified.com/bid/153070/Top Concerns-When-Creating-a-BYOD-Policy. Rob Humphrey. (March 07, 2012). Manage Risks & Reap Rewards: BYOD. In Kensington Safe Zone with Rob Humphrey - Blog . Retrieved , from http://blog.kensington.com/security/2012/03/07/manage-risks-reap-rewards-byod/. Zachman, J. (2008). John Zachman 's concise definition of the zachman framework. Retrieved from http://www.zachman.com/about-the-zachman-framework…

    • 3615 Words
    • 15 Pages
    Best Essays
  • Best Essays

    Eddy, N. (2013). BYOD Policies to Bring 1 Billion Devices to Businesses by 2018. Eweek 5.…

    • 1383 Words
    • 6 Pages
    Best Essays
  • Powerful Essays

    I Love It

    • 1840 Words
    • 8 Pages

    Microsoft Information Technology (Microsoft IT) lacked a timely solution for keeping pace with the surging trend of employees who use personal devices to do Microsoft work. Without a user- and IT-friendly way to bring all devices into the scope of centralized management, IT risked improper exposure of secure company data, among other concerns.…

    • 1840 Words
    • 8 Pages
    Powerful Essays