Bring Your Own Device
“Solving The BYOD Problem For The Enterprise”
Page | 1
I.
Introduction Enterprise computing, as we know it, is facing a dimensional shift with the widespread
diffusion of the BYOD (Bring Your Own Device) phenomenon. BYOD is the latest trend hitting businesses where employees are bringing their own personal mobile devices. Some of these devices include smartphones and tablets which are brought into their place of work, and used on the corporate network for purposes such as accessing files, email servers, and databases. Over the past few years, employees in many organizations are bringing their own personal devices to the work environment to handle business needs. With employees using their own devices, CIOs and IT departments across the nation are frantically trying to keep up with their employees by ensuring their networks are safe and secure. There is no doubting mobile devices have taking over a big part of our lives. These devices travel with us wherever we go while always being within a short reach away. People are beginning to realize the usefulness of getting work done from their own mobile devices. With this trend enterprises are in need of a policy for employees bringing their own devices to work. Although a relaxed BYOD policy can offer an organization many benefits, it tends to be a double edged sword. A lax policy leaves sensitive data vulnerable; an overly strict one stifles employees trust relationship with their employer. A balance must be struck between offering employees a pleasant and enjoyable work environment and maintaining the security of enterprise data. As the expectations of workspace personnel evolve, organization leaders must find ways to adapt and overcome the challenges that arise when corporate culture has a conflict with social standards and consumer trends. Management must consider the potential detriment to the workforce
Cited: Aala Santhosh Reddy. (June 2012). Bring Your Own Device (BYOD) - Making It Work For Your Organization. In Slideshare.com for Cognizant Research Center. Retrieved , from http://www.slideshare.net/cognizant/making-byod-work-for-your-organization 13450463. BYOD Policy Implementation Guide. London: Absolute Software, 2012. PDF. Cisco Systems, Inc.. (2012). Cisco Identity Services Engine Software 1.1.1 (aka 1.1MR). In Cisco. Retrieved , from http://www.cisco.com/en/US/prod/collateral/vpndevc/ps5712/ps11637/ps11195/qa_ 67-658591.html. Ericka Chickowski. (June 19, 2012). Visibility and Control Still an Issue With BYOD Policies. I Network Computing: For IT By IT. Retrieved , from http://www.networkcomputing.com/security/visibility-and-control-still-an-issue wi/240002308. Gibson, C. (2004). It-enabled business change: An approach to understanding and managing risk. Retrieved from http://papers.ssrn.com/sol3/papers.cfm? ISACA. (2009). The risk it framework. Retrieved from http://www.isaca.org/Knowledge Center/Risk-IT-IT-Risk-Management/Pages/Risk-IT1.aspx IT Governance Institute. (2008). Enterprise value: Governance of it investments. the val it framework 2.0. Retrieved from http://www.isaca.org/KnowledgeJoe McKendrick. (October 23, 2012). 10 steps for writing a secure BYOD policy. In ZDNet.com. Retrieved , from http://www.zdnet.com/10-steps-for-writing-a-secure-byod-policy 7000006170/ Jonathan Hassell. (May 17, 2012). 7 Tips for Establishing a Successful BYOD Policy. In CIO.com. Retrieved , from Page | 15 http://www.cio.com/article/706560/7_Tips_for_Establishing_a_Successful_BYOD_Poli y. Kaneshige, T . (March 06, 2012). BYOD: Making Sense of the Work-Personal Device Blur. In CIO.com. Retrieved , from http://www.cio.com/article/701545/BYOD_Making_Sense_of_the_Work_Personal_De ce_Blur. Kenneth Corbin. (August 23, 2012). BYOD Security Demands Mobile Data Protection Strategy. In CIO.com. Retrieved , from http://www.cio.com/article/714550/BYOD_Security_Demands_Mobile_Data_Protecti n_Strategy. Lundblad, J. (2003). A review and critique of rogers ' diffusion of innovation theory as it applies to organizations.Organization Development Journal, 21(4), 50-64. Retrieved from http://search.proquest.com/docview/197971687?accountid=7113 Miller, K., Voas, J., Hurlburt, G. (2012). BYOD: Security and Privacy Considerations. IT Professionals. 14 (5), 53-55. Retrieved from http://ieeexplore.ieee.org Mark Pendleton. (August 13, 2012). Top Concerns When Creating a BYOD Policy. In NEC Corporation of America. Retrieved , from http://info.necunified.com/bid/153070/Top Concerns-When-Creating-a-BYOD-Policy. Rob Humphrey. (March 07, 2012). Manage Risks & Reap Rewards: BYOD. In Kensington Safe Zone with Rob Humphrey - Blog . Retrieved , from http://blog.kensington.com/security/2012/03/07/manage-risks-reap-rewards-byod/. Zachman, J. (2008). John Zachman 's concise definition of the zachman framework. Retrieved from http://www.zachman.com/about-the-zachman-framework Page | 16