...Bring Your Own Device (BYOD) Michelle Cheek CIS/333 Prof. Roy Creasey April 20, 2016 Throughout the world today, personal communication devices are becoming more of a trend in within many organizations. With the policy Bring Your Own Device BYOD, organizations has begun to allow their employees and contractors to bring their personal or given handheld devices. Allowing employees to connect to the organizations network giving them access to company information and applications. Devices such as, laptops, smart phones, tablets are all being used in many organizations to complete many tasks while at work. There are many benefits with Bring Your Own Device. There is increased productivity “research also shows that employees are even more productive if the device they use is their own” (Wiech, 2016). The use of their own device helps employees to be more interactive with the task they complete. Cost is another benefit in which is lower because the organization don’t have to come out-of-the pocket for as many devices that most companies require. By employees using their own device cuts the price down on devices in the office it definitely cuts down spending in an organization. For instance, employees using their own...
Words: 815 - Pages: 4
...Bring Your Own Devices Bring your own device (BYOD) is a key topic in today's professional organizations. There are several benefits for organizations that allow BYOD that reflect productivity within the workforce as well as employee/employer work experience. With these benefits also come substantial risks involved with allowing such devices within the confines of buildings. These risks might include information security concerns, operational security concerns, and overall networking security. These concerns arise throughout all organizations, especially government organizations and major corporate retailers in light of recent cyber-attacks. BYOD is a major security topic in today's social market. Benefits offered to organizations that allow BYOD can span many different areas in the workplace. Productivity can be enhanced by allowing employees to transport work to their home device in order to complete a time-sensitive task after close of business or while traveling. BYOD might also allow the employer to save on equipment costs such as an intricate telephony network by allowing employees to use personal cellular phones for business contacts. Personal storage devices might also allow the employer to save on network storage devices for certain departments within the organization. Employee work experience may also be enhanced by allowing employees to have a personal communication device that is included in many emergency contacts information such as child care, hospitals, and doctors'...
Words: 787 - Pages: 4
...Case Study 1 Bring your own device (BYOD) Cynthia Lopez Networking Security Fundamental OCT. 26, 2015 Good news now your company has bring your own device program so you can finally use your phone that has more capability than the boring company’s phone. Now you can you can use your new shiny iPhone for work. You can now even check your corporate email from home and stream YouTube videos too all while your company splits the bill. Will now that it all seem great and you are happy to join the company’s bring your own device you wake up reach for your phone to check your emails but it doesn’t turn on its become a brick! You do some family investigation you realize that the little one tried to guess your password and entered it wrong several times your company’s security policy shut down your phone to keep sensitive material from unauthorized access. Your phone is brought back to life and restored but realize now that all your pictures are lost and any notes you might have saved on your phone. It is gone forever. (The Dark Side of BYOD) pg1. Many employees are shocked to know that their personal devices can be asked to be surrendered. In bring your own device companies can track you using GPS on your device to track your whereabouts. Selectively disable camera and microphone when the device enters restricted company areas to prevent sensitive data loss. Online activity can also be monitored to protect the company from any liability arising from an improper...
Words: 663 - Pages: 3
...Bring Your Own Device (BYOD) Bring Your Own Device (BYOD) There are pros and cons to a BYOD policy. Each company must carefully weigh both sides of the situation before making a decision. As the business world moves forward, there may be more companies using BYOD. There are some benefits to a BYOD policy. Having employees use their own devices can save the company money. Instead of buying devices for everyone, they can just buy them for the ones that need them, and the ones that work on projects that need more security. BYOD could also lower maintenance and IT costs, as users would be responsible for their own devices. Since storage would be accomplished via cloud storage, there would not be much risk to the company concerning lost files or shared files. Many users would probably welcome the chance to work on their own devices instead of company devices. Users may feel more comfortable using their own device which might lead to a more productive employee. There are still many risks involved with BYOD. The biggest risk is the possibility of lost files or someone loaning their own device to someone else. It is not uncommon for someone to pass their device around to different people. Another risk is that with BYOD, the company has to support several different brands of devices and also different platforms. The company may have to structure their company to accommodate this. The company also doesn’t have control over what items the employee puts on their device...
Words: 360 - Pages: 2
...This report is intended to provide a recommendation to Island Public School in regards to implementing a Bring Your Own Device (BYOD) program. Current and relevant research and literature in the field will be summarised and discussed while referring to the school’s context in order to justify a recommendation. Summary of Readings ‘The NMC Horizon Report: K-12 Edition’ (Johnson et al. 2013) reports on current trends in educational technology, recently emerging technologies, and the implications that these technologies will have for educators in primary and high schools. The report suggests that mobile devices are gaining greater popularity in schools, and provides support for BYOD pedagogy (Johnson et al. 2013). There are a number of benefits...
Words: 1868 - Pages: 8
...BYOD (Bring Your Own Device): Hot or Not? Andrea Ferguson CGS1016-39433 BYOD is the hottest acronym in IT since ITIL. Professionals want to know what’s going on with BYOD, regardless of whether they’re on a team supporting such a program, considering adding such a program, already a part of a BYOD program or simply just interested out of personal curiosity. This paper will explore a few of the pros and cons of a BYOD program. Cisco sponsored a survey of 600 IT and business leaders. The results of this survey showed that 95% of their businesses permit corporate network access by employee-owned devices. Out of the 600 surveyed, 48% support a select list of devices, while 36% allow all devices. Additionally, 11% of those businesses allow employee-owned devices access to enterprise networks but do not offer any type of IT support. It’s clear that businesses have a drive to implement BYOD programs. It’s also clear that these programs are highly popular with both company and employee. Mobile devices, powerful yet inexpensive and easy-to-use tools, help employees to be productive regardless of their location. Collaborative efforts and information exchange can increase, allowing a business to step up their reaction to market changes and/or customer needs. Another plus is that virtually every employee owns some sort of personal mobile device. While mobile technologies use does have the potential to transform business, it can also disrupt IT. Today’s employee expects...
Words: 1194 - Pages: 5
...Assignment The Bring Your Own Device (BYOD) Policy: Implications on Corporate Security Abstract: The paper discusses: 1) potential vulnerabilities in the Bring Your Own Device (BYOD) Policy when adopted by a company; 2) threats to a network from untrusted and unmanaged devices; and 3) best practices for implementing the BYOD policy in a workplace. The paper also proposes one of many solutions that can be implemented to make the policy robust. Bring Your Own Device or BYOD is the policy, whereby employees are allowed to utilize their own personal computing devices to access corporate resources to perform their day-to-day job duties. These devices can include laptops, smart phones, and tablets and the corporate resources include sensitive, private and privileged information. When not implemented correctly, the BYOD policy is a vulnerability for businesses and enterprises, since sensitive data is accessed through unmanaged and potentially compromised devices. This accessed data has the potential to end up in the wrong hands in an ever-increasing number of ways. This puts pressure on IT managers to manage and secure these devices and protect proprietary company data. BYOD offers potential cost-saving measures, since it allows employees to bring their personal computing devices to the workplace, thereby eliminating the need for businesses to provide them with these devices. When individuals can work from and use a device they are familiar with...
Words: 2386 - Pages: 10
...and peripherals for those and other various computer companies. The components that are made in this industry include printers, Web and PC cameras, devices that are used for pointing, keyboards, monitors, and even storage devices.4 Computer components that use a semiconductor are not made in this industry. This would include things like a circuit board or a microprocessor. According to Oxford Dictionaries BYOD, which stands for bring your own device, is the practice of allowing the employees of an organization to use their own computers, smartphones, or other devices for work purposes.2 A large number of workers are bringing their own devices into their place of work...
Words: 1097 - Pages: 5
...BYOD (Bring You Own Device) YT Strayer University Abstract BYOD (Bring You Own Device) promises many benefits such as greater innovation, better work-life balance and improved productivity, but it also increases pressure on IT to manage and secure devices and data. How to do BYOD successfully is a challenge. This paper discusses some of the pros and the cons of BYOD as well as an example of an organization that uses it. Bring Your Own Device BYOD is famous because it brings freedom, to employees and to employers. It means that workers can bring their own computers, tablet PCs, smartphones and other productivity and communication devices in their places of work for professional activities. While it is much appreciated by most, it comes with many drawbacks and has to be dealt with with particular caution. In this article, we look at how people in businesses are welcoming the idea, its pros and its cons. The Pros of BYOD Workplaces Organizations who implemented BYOD have several benefits such as: Enhanced Productivity. Mobile devices offer the benefits of convenience and speed. Sales executives can do their jobs while traveling, management can keep up with emails or review important documents on their tablets, and anyone can stay connected with their Smart phone. Smart phones have become a primary player in how workers communicate and share both work-related and personal data throughout the course of a day. Cost Savings. Within Bring Your Own Device environments...
Words: 755 - Pages: 4
...Bring Your Own Device (BYOD) Bikash Rasaily Deborah Blockett CIS 333 10/24/2014 Many working people appreciate Apple with its iPhone as well as blackberry for inventing the concept of BYOD also known as Bring your own device (Egan, 2013). Under BYOD concept, employees bring their own mobile devices and PCs to perform their job tasks at workplace. Many organizations that have embedded this concept in their workplace have benefit from it but we should also keep in mind about IT security of the company. Some of the key benefit of using BYOD include increased productivity and innovation, employee satisfaction and Cost saving (BYOD: Bring your own device, 2014). Employees are more comfortable with their device and are experts in using it, which makes them more productivity and innovative (BYOD: Bring your own device, 2014). They can work whenever and wherever they want and don’t have to be in their desk to do their office work. BYOD programs also help in saving money but shifting the cost to the user, with employees paying for their device and data services (BYOD: Bring your own device, 2014). Employees would be satisfied if they use the device they have chosen and invested in rather then what was selected by IT (BYOD: Bring your own device, 2014). The key way of this concept is about allowing the staff to take and use their own device is seen as employer being open-minded and flexible. The new generation prefers to work in the flexible environment where his or her bosses...
Words: 1110 - Pages: 5
...Bring your own device Let’s take a moment to understand the opportunity and the downside of people utilizing their own personal device in the work force. As IT departments struggle to keep up with yearly technology changes, company employees increasingly want to utilize their own electronic equipment to access corporation data. People utilize, bring you own device (BYOD),bring your own tablet (BYOT), Bring Your Own Phone (BYOP) and Bring Your Own PC (BYOPC) All of these have evolved to empower workforces through the so-called 'computerization of IT. As these services are growing fast, these can be serious risks to company’s data. Richard Absalom, an analyst at Ovum, believes that BYOD will happen whether a company plans for it or not. He says: "Trying to stand in the path of computerized mobility is likely to be a damaging and futile exercise." The best thing that a company or enterprise can do, is to be aware of the benefits and understand the risks. Despite the serious risks involved, there are serious benefits and advantages businesses can benefit from them, it can potentially increasing employee satisfaction, employees can work more flexible, cost savings, it reduces hardware spend, software licensing, device maintenance and productivity gains, employees are happier when they use their own personal device. As I have mentioned, there are risks involved when employees uses their own contrivance in the work force. The questions arise who owns the device...
Words: 305 - Pages: 2
...info BRING YOUR OWN DEVICE (BYOD): SECURITY RISKS AND MITIGATING STRATEGIES 1 Prashant Kumar Gajar, 2*Arnab Ghosh and 3Shashikant Rai 1 Master of Science-Cyber Law & Information Security Indian Institute of Information Technology-Allahabad India prashant.developer@gmail.com 2* Master of Science-Cyber Law & Information Security Indian Institute of Information Technology-Allahabad India arnabghosh.ghosharnab@gmail.com 3 Master of Science-Cyber Law & Information Security Indian Institute of Information Technology-Allahabad India shashikant@iiita.ac.in Abstract: The growth of mobile technology, with regard to availability of 3G/4G services and devices like Smartphone’s has created new phenomenon for communication and data processing ability to do business. One such phenomenon that has emerged in the business environment is BYOD (Bring Your Own Device), which means that employees use their personal device to access company resources for work, inside or outside organizational environment. This new phenomenon brings with itself new opportunities but has many risks associated with it. Using mobile devices for personal as well as professional work brings with itself risks that need to be mitigated. The aim of this work is to provide various mobility strategies, defences and measures, control aspect, management and governance aspect to look forth in implementing a BYOD strategy in an organization. Keywords: Risk, Defences, Bring Your Own Device, Have Your Own Device...
Words: 6038 - Pages: 25
...SELECTING YOUR DEVICE OPTION Select the Device Option you desire and click the Get Started button. Bring Your Own Device (BYOD) allows you to bring a Sprint inactive device without the need to purchase a new phone. Customers can bring their own inactive Sprint device or buy one on the Stream Store. (Note: Customers buying a phone on the Stream Store will need to treat the activation as a BYOD). Very soon, you will be able to purchase a phone on an installment plan. STEP 2: CHECKING YOUR COVERAGE Once you’ve clicked Get Started, you’ll be asked to enter your zip code. Enter it, then press Go. *STREAM’S GSM NETWORK IS POWERED BY ZTAR MOBILE. STREAM’S CDMA NETWORK IS POWERED BY SPRINT. STEP-BY-STEP ENROLLMENT PROCESS 1 STEP 3: SELECTING YOUR NETWORK Pick the network you wish to enroll on and choose the type of plan you desire, individual or shared, by clicking the Get Started button within the appropriate network. STEP 4: ENTERING YOUR DEVICE MODEL FOR BYOD (GSM ONLY) NOTE: If you’re enrolling in CDMA, please skip to step 5. You will be directed to the Bring Your Own Device (GSM) Screen. To ensure your GSM device is compatible, follow these three steps: 1. If your device is not an AT&T device, you will need to ensure it is unlocked. Check with the device carrier to unlock it. 2. AT&T devices do not need to be unlocked. NOTE: If you are keeping your existing number (porting), we have prepared a guide to ensure a seamless move. There is information from your current...
Words: 1436 - Pages: 6
...mobile devices, they increasingly use them to store and access a variety of personal information. In addition, my companies are utilizing mobile devices to increase productivity and collaboration among employees. As of December 2013 Google’s Android Operation System was the top smart phone platform with 52.5% of the market share ("iOS Continues Gaining U.S. Smartphone Share"). As these numbers continue to grow cybercriminals have taken notice and there has been an increase in the number of malware programs developed for the Android operating system. These malware programs can present a variety of threats from allowing criminals access to important personal information to intercepting private text messages and emails as well as even allowing someone to remotely turn on the phone’s mic. These threats can present a problem to both private individuals and businesses alike. It is important that steps be taken to prevent cybercriminals from accessing this information by preventing malware from being installed on these devices. If I was responsible for strengthening this area of IT security, I would recommend several steps. For starters, I would provide education to personal and business users to instruct them on the proper software to have installed in order to protect their devices as well as things to look out for and avoid. For businesses, I would recommend they employ strict guidelines for users of company equipment and dictate polices for users that bring their own devices. An...
Words: 803 - Pages: 4
...Should Students be allowed to Use Mobile Devices in School? Stacy Scott COMM/215 January 10, 2014 Linda Camp Should Students be allowed to Use Mobile Devices in School? Mobile devices have brought a whole new outlook on the world as we know it today. It can be used for entertainment such as games, movies and music; networking such as social media; communicating such as texting, face-time and Skype; organization such as Outlook; and much, much more. Mobile devices have allowed anyone who uses it to access almost anything they want or need like a pocket-size computer. Schools have already started to incorporate mobile devices in the classroom. This then raises my point that students should be allowed to use mobile devices in school. The first and most important reason I believe in this is a lot of students have expected or unexpected after school activities. For those students who have required after school activities, this activity may run later than usual, and they may want to let their parents know they are going to be late and why. For those students who have unexpected after school activities such as some extra tutoring, they may want to let their parents know where they are and when they can expect them home or when they can be picked up. This gives the students the opportunity to text, e-mail, or leave a voicemail message to their parents in order to alert them of these types of changes. It also frees the parents from worry and maybe even rushing as well as giving...
Words: 823 - Pages: 4