...BYOD (Bring Your Own Device): Hot or Not? Andrea Ferguson CGS1016-39433 BYOD is the hottest acronym in IT since ITIL. Professionals want to know what’s going on with BYOD, regardless of whether they’re on a team supporting such a program, considering adding such a program, already a part of a BYOD program or simply just interested out of personal curiosity. This paper will explore a few of the pros and cons of a BYOD program. Cisco sponsored a survey of 600 IT and business leaders. The results of this survey showed that 95% of their businesses permit corporate network access by employee-owned devices. Out of the 600 surveyed, 48% support a select list of devices, while 36% allow all devices. Additionally, 11% of those businesses allow employee-owned devices access to enterprise networks but do not offer any type of IT support. It’s clear that businesses have a drive to implement BYOD programs. It’s also clear that these programs are highly popular with both company and employee. Mobile devices, powerful yet inexpensive and easy-to-use tools, help employees to be productive regardless of their location. Collaborative efforts and information exchange can increase, allowing a business to step up their reaction to market changes and/or customer needs. Another plus is that virtually every employee owns some sort of personal mobile device. While mobile technologies use does have the potential to transform business, it can also disrupt IT. Today’s employee expects...
Words: 1194 - Pages: 5
...Assignment The Bring Your Own Device (BYOD) Policy: Implications on Corporate Security Abstract: The paper discusses: 1) potential vulnerabilities in the Bring Your Own Device (BYOD) Policy when adopted by a company; 2) threats to a network from untrusted and unmanaged devices; and 3) best practices for implementing the BYOD policy in a workplace. The paper also proposes one of many solutions that can be implemented to make the policy robust. Bring Your Own Device or BYOD is the policy, whereby employees are allowed to utilize their own personal computing devices to access corporate resources to perform their day-to-day job duties. These devices can include laptops, smart phones, and tablets and the corporate resources include sensitive, private and privileged information. When not implemented correctly, the BYOD policy is a vulnerability for businesses and enterprises, since sensitive data is accessed through unmanaged and potentially compromised devices. This accessed data has the potential to end up in the wrong hands in an ever-increasing number of ways. This puts pressure on IT managers to manage and secure these devices and protect proprietary company data. BYOD offers potential cost-saving measures, since it allows employees to bring their personal computing devices to the workplace, thereby eliminating the need for businesses to provide them with these devices. When individuals can work from and use a device they are familiar with...
Words: 2386 - Pages: 10
...BYOD (Bring You Own Device) YT Strayer University Abstract BYOD (Bring You Own Device) promises many benefits such as greater innovation, better work-life balance and improved productivity, but it also increases pressure on IT to manage and secure devices and data. How to do BYOD successfully is a challenge. This paper discusses some of the pros and the cons of BYOD as well as an example of an organization that uses it. Bring Your Own Device BYOD is famous because it brings freedom, to employees and to employers. It means that workers can bring their own computers, tablet PCs, smartphones and other productivity and communication devices in their places of work for professional activities. While it is much appreciated by most, it comes with many drawbacks and has to be dealt with with particular caution. In this article, we look at how people in businesses are welcoming the idea, its pros and its cons. The Pros of BYOD Workplaces Organizations who implemented BYOD have several benefits such as: Enhanced Productivity. Mobile devices offer the benefits of convenience and speed. Sales executives can do their jobs while traveling, management can keep up with emails or review important documents on their tablets, and anyone can stay connected with their Smart phone. Smart phones have become a primary player in how workers communicate and share both work-related and personal data throughout the course of a day. Cost Savings. Within Bring Your Own Device environments...
Words: 755 - Pages: 4
...Case Study 1 Bring your own device (BYOD) Cynthia Lopez Networking Security Fundamental OCT. 26, 2015 Good news now your company has bring your own device program so you can finally use your phone that has more capability than the boring company’s phone. Now you can you can use your new shiny iPhone for work. You can now even check your corporate email from home and stream YouTube videos too all while your company splits the bill. Will now that it all seem great and you are happy to join the company’s bring your own device you wake up reach for your phone to check your emails but it doesn’t turn on its become a brick! You do some family investigation you realize that the little one tried to guess your password and entered it wrong several times your company’s security policy shut down your phone to keep sensitive material from unauthorized access. Your phone is brought back to life and restored but realize now that all your pictures are lost and any notes you might have saved on your phone. It is gone forever. (The Dark Side of BYOD) pg1. Many employees are shocked to know that their personal devices can be asked to be surrendered. In bring your own device companies can track you using GPS on your device to track your whereabouts. Selectively disable camera and microphone when the device enters restricted company areas to prevent sensitive data loss. Online activity can also be monitored to protect the company from any liability arising from an improper...
Words: 663 - Pages: 3
...Bring Your Own Device (BYOD) Bikash Rasaily Deborah Blockett CIS 333 10/24/2014 Many working people appreciate Apple with its iPhone as well as blackberry for inventing the concept of BYOD also known as Bring your own device (Egan, 2013). Under BYOD concept, employees bring their own mobile devices and PCs to perform their job tasks at workplace. Many organizations that have embedded this concept in their workplace have benefit from it but we should also keep in mind about IT security of the company. Some of the key benefit of using BYOD include increased productivity and innovation, employee satisfaction and Cost saving (BYOD: Bring your own device, 2014). Employees are more comfortable with their device and are experts in using it, which makes them more productivity and innovative (BYOD: Bring your own device, 2014). They can work whenever and wherever they want and don’t have to be in their desk to do their office work. BYOD programs also help in saving money but shifting the cost to the user, with employees paying for their device and data services (BYOD: Bring your own device, 2014). Employees would be satisfied if they use the device they have chosen and invested in rather then what was selected by IT (BYOD: Bring your own device, 2014). The key way of this concept is about allowing the staff to take and use their own device is seen as employer being open-minded and flexible. The new generation prefers to work in the flexible environment where his or her bosses...
Words: 1110 - Pages: 5
...Bring your own device Victor Morgan CIS330 Strayer University Bring your own device As practice shows, a growing number of employees use at work their own mobile devices. This year, many tech sites are increasingly flashes by acronym BYOD (Bring Your Own Device) – “Take your own devices to work”. As of today, when it is posible connect to different cloud services and harness the power of personal device to perform the work steps, literally holding the phone, and the range of devices has become a truly enormous, sometimes for an employee computer standing on his desk has no value. With the ability to perform the same work tasks, but with the help of his personal device employee, in practice, will seek to do so. The task of company IT-service – is to provide him such. BYOD (bring your own device) – is a term that describes a situation where an employee of organization instead of corporate computer uses to run his own device, whether it is his personal laptop, tablet, or, in extreme cases, even a smartphone. BYOD term appeared at least since 2004. However, the explosive popularity of this idea is found only recently and mainly due to the activity of suppliers of IT-services and the rapid development of functional diversity and cloud services. Today, the growing popularity of BYOD concept affects the number of positions in many areas of IT: from the technical support department to department of development of mobile applications and security management and monitoring of compliance...
Words: 1133 - Pages: 5
...Bring Your Own Device (BYOD) Michelle Cheek CIS/333 Prof. Roy Creasey April 20, 2016 Throughout the world today, personal communication devices are becoming more of a trend in within many organizations. With the policy Bring Your Own Device BYOD, organizations has begun to allow their employees and contractors to bring their personal or given handheld devices. Allowing employees to connect to the organizations network giving them access to company information and applications. Devices such as, laptops, smart phones, tablets are all being used in many organizations to complete many tasks while at work. There are many benefits with Bring Your Own Device. There is increased productivity “research also shows that employees are even more productive if the device they use is their own” (Wiech, 2016). The use of their own device helps employees to be more interactive with the task they complete. Cost is another benefit in which is lower because the organization don’t have to come out-of-the pocket for as many devices that most companies require. By employees using their own device cuts the price down on devices in the office it definitely cuts down spending in an organization. For instance, employees using their own...
Words: 815 - Pages: 4
...Bring Your Own Devices Bring your own device (BYOD) is a key topic in today's professional organizations. There are several benefits for organizations that allow BYOD that reflect productivity within the workforce as well as employee/employer work experience. With these benefits also come substantial risks involved with allowing such devices within the confines of buildings. These risks might include information security concerns, operational security concerns, and overall networking security. These concerns arise throughout all organizations, especially government organizations and major corporate retailers in light of recent cyber-attacks. BYOD is a major security topic in today's social market. Benefits offered to organizations that allow BYOD can span many different areas in the workplace. Productivity can be enhanced by allowing employees to transport work to their home device in order to complete a time-sensitive task after close of business or while traveling. BYOD might also allow the employer to save on equipment costs such as an intricate telephony network by allowing employees to use personal cellular phones for business contacts. Personal storage devices might also allow the employer to save on network storage devices for certain departments within the organization. Employee work experience may also be enhanced by allowing employees to have a personal communication device that is included in many emergency contacts information such as child care, hospitals, and doctors'...
Words: 787 - Pages: 4
...Bring your own device Let’s take a moment to understand the opportunity and the downside of people utilizing their own personal device in the work force. As IT departments struggle to keep up with yearly technology changes, company employees increasingly want to utilize their own electronic equipment to access corporation data. People utilize, bring you own device (BYOD),bring your own tablet (BYOT), Bring Your Own Phone (BYOP) and Bring Your Own PC (BYOPC) All of these have evolved to empower workforces through the so-called 'computerization of IT. As these services are growing fast, these can be serious risks to company’s data. Richard Absalom, an analyst at Ovum, believes that BYOD will happen whether a company plans for it or not. He says: "Trying to stand in the path of computerized mobility is likely to be a damaging and futile exercise." The best thing that a company or enterprise can do, is to be aware of the benefits and understand the risks. Despite the serious risks involved, there are serious benefits and advantages businesses can benefit from them, it can potentially increasing employee satisfaction, employees can work more flexible, cost savings, it reduces hardware spend, software licensing, device maintenance and productivity gains, employees are happier when they use their own personal device. As I have mentioned, there are risks involved when employees uses their own contrivance in the work force. The questions arise who owns the device...
Words: 305 - Pages: 2
...info BRING YOUR OWN DEVICE (BYOD): SECURITY RISKS AND MITIGATING STRATEGIES 1 Prashant Kumar Gajar, 2*Arnab Ghosh and 3Shashikant Rai 1 Master of Science-Cyber Law & Information Security Indian Institute of Information Technology-Allahabad India prashant.developer@gmail.com 2* Master of Science-Cyber Law & Information Security Indian Institute of Information Technology-Allahabad India arnabghosh.ghosharnab@gmail.com 3 Master of Science-Cyber Law & Information Security Indian Institute of Information Technology-Allahabad India shashikant@iiita.ac.in Abstract: The growth of mobile technology, with regard to availability of 3G/4G services and devices like Smartphone’s has created new phenomenon for communication and data processing ability to do business. One such phenomenon that has emerged in the business environment is BYOD (Bring Your Own Device), which means that employees use their personal device to access company resources for work, inside or outside organizational environment. This new phenomenon brings with itself new opportunities but has many risks associated with it. Using mobile devices for personal as well as professional work brings with itself risks that need to be mitigated. The aim of this work is to provide various mobility strategies, defences and measures, control aspect, management and governance aspect to look forth in implementing a BYOD strategy in an organization. Keywords: Risk, Defences, Bring Your Own Device, Have Your Own Device...
Words: 6038 - Pages: 25
...Week 3 Case study BYOD has the potential for big cost savings because organizations that let employees bring their own devices to work don't waste money on corporate phones. Plus, when an employee can work from a device of his own choosing, it's more enjoyable than being forced to use a corporate-issued device. That means happier and more productive users. Another advantage of BYOD is that it supports a mobile and cloud-focused IT strategy. From their personal mobile devices, employees can access their work in the cloud, further improving productivity. The overall BYOD benefits are that they save the company money and they make workers happy. There are however four big BYOD risks. Think about how you'll pay for services. Users might pay for devices, but who's going to pay for the voice and data plans? There are a couple of ways you can handle cost-sharing, but it's important to pick one and get users to agree to it. You're going to have to draft acceptable use and security policies that include the consequences of violation. Then you need to train users and help desk staff on best practices and support. You'll have to know how to handle the biggest BYOD challenges, security. At a urban health plan inc their doctors travel a large hospital with their iThings, recording patient information, diagnostic data and preparing reports. The network travels with the doctor, following him or her throughthe building. When it’s time to print, the request is sent to the closest printer where...
Words: 341 - Pages: 2
...BYOD/Mobile Assignment The organization that I work for is in the computer hardware industry. The organization works with top computer technology companies like Dell, Apple, Ibm, and Microsoft. The organization I work for does the manufacturing and assembling of computer hardware and peripherals for those and other various computer companies. The components that are made in this industry include printers, Web and PC cameras, devices that are used for pointing, keyboards, monitors, and even storage devices.4 Computer components that use a semiconductor are not made in this industry. This would include things like a circuit board or a microprocessor. According to Oxford Dictionaries BYOD, which stands for bring your own device, is the practice of allowing the employees of an organization to use their own computers, smartphones, or other devices for work purposes.2 A large number of workers are bringing their own devices into their place of work...
Words: 1097 - Pages: 5
...mobile devices, they increasingly use them to store and access a variety of personal information. In addition, my companies are utilizing mobile devices to increase productivity and collaboration among employees. As of December 2013 Google’s Android Operation System was the top smart phone platform with 52.5% of the market share ("iOS Continues Gaining U.S. Smartphone Share"). As these numbers continue to grow cybercriminals have taken notice and there has been an increase in the number of malware programs developed for the Android operating system. These malware programs can present a variety of threats from allowing criminals access to important personal information to intercepting private text messages and emails as well as even allowing someone to remotely turn on the phone’s mic. These threats can present a problem to both private individuals and businesses alike. It is important that steps be taken to prevent cybercriminals from accessing this information by preventing malware from being installed on these devices. If I was responsible for strengthening this area of IT security, I would recommend several steps. For starters, I would provide education to personal and business users to instruct them on the proper software to have installed in order to protect their devices as well as things to look out for and avoid. For businesses, I would recommend they employ strict guidelines for users of company equipment and dictate polices for users that bring their own devices. An...
Words: 803 - Pages: 4
...In this case study we explored a business strategy referred to as BYOD or Bring Your Own Device. This networking model allows a company’s employees to use personal devices of their choice when accessing and interpreting company data. This approach has mutual benefits with both the organization as well as the employee. These personal devices give the users increased mobility when accessing platforms within the organization from multiple locations. This proves useful when considering that some work can be taken home or to other places to be completed. In addition to Mobility, this method allows employees to use the programs they are most familiar with to complete tasks. This helps increase speed and accuracy of the employee’s efforts, thus increasing the company’s efficiency and productivity. One intangible benefit, in implementing the bringyourowndevice style, is that you have a much higher satisfaction rate with the employees, which helps boost morale. Another benefit is that the company incurs lower overhead costs associated with IT expenses such as hardware procurement and the maintenance associated with the hardware. The Bring Your Own Device to work model has many benefits, but it also has serious risks associated with those benefits. By using this model the organization is left vulnerable to outside influences. From my research on this topic I found that the organization is put at risk on several levels. When one considers how intricate and massive some networks are...
Words: 831 - Pages: 4
...Intel BYOD Assignment Questions 1. Does BYOD increase productivity in workplaces? 2. Should it be encouraged or discouraged? 3. How might other firms benefit from Intel’s approach to security (as shown in case Exhibit 2)? 4. How can Intel turn BYOD into a new source of competitive advantage? 5. What decisions can Intel make to ensure security of the corporate data on an employee-owned device that is used in the workplace? 6. How should Intel manage BYOD in the face of its e-Discovery obligations? Pasted from Role: Malcom Harkins, chief information security officer was facing dilemnas in taking forward the Bring your own device initiative. - By 2014 at least 70% of employees would be using their own device for at least part of their job. Issue - The difference between personal data and corporate data… was no longer limited to office hours, just as peronal data was no longer off-0 limits during office hours - Employees would be distracted by applications embedded into their devices, which could potentially lead to a negatice impact on productivity - Greater risk in data security - Intel neded control over to access and control company info.. But doing so on employee devices would violate privacy Benefits - Reduced intel's hardware cost because employees bought their own hardware but increased cost in supporting , configuring those devices - Lower cost in data because telecom charged 33% less for personal vs corp data.. Approaches - Do nithng.. And hope that bringing in own devices...
Words: 527 - Pages: 3