...BYOD (Bring You Own Device) YT Strayer University Abstract BYOD (Bring You Own Device) promises many benefits such as greater innovation, better work-life balance and improved productivity, but it also increases pressure on IT to manage and secure devices and data. How to do BYOD successfully is a challenge. This paper discusses some of the pros and the cons of BYOD as well as an example of an organization that uses it. Bring Your Own Device BYOD is famous because it brings freedom, to employees and to employers. It means that workers can bring their own computers, tablet PCs, smartphones and other productivity and communication devices in their places of work for professional activities. While it is much appreciated by most, it comes with many drawbacks and has to be dealt with with particular caution. In this article, we look at how people in businesses are welcoming the idea, its pros and its cons. The Pros of BYOD Workplaces Organizations who implemented BYOD have several benefits such as: Enhanced Productivity. Mobile devices offer the benefits of convenience and speed. Sales executives can do their jobs while traveling, management can keep up with emails or review important documents on their tablets, and anyone can stay connected with their Smart phone. Smart phones have become a primary player in how workers communicate and share both work-related and personal data throughout the course of a day. Cost Savings. Within Bring Your Own Device environments...
Words: 755 - Pages: 4
...Bring Your Own Device (BYOD) Bikash Rasaily Deborah Blockett CIS 333 10/24/2014 Many working people appreciate Apple with its iPhone as well as blackberry for inventing the concept of BYOD also known as Bring your own device (Egan, 2013). Under BYOD concept, employees bring their own mobile devices and PCs to perform their job tasks at workplace. Many organizations that have embedded this concept in their workplace have benefit from it but we should also keep in mind about IT security of the company. Some of the key benefit of using BYOD include increased productivity and innovation, employee satisfaction and Cost saving (BYOD: Bring your own device, 2014). Employees are more comfortable with their device and are experts in using it, which makes them more productivity and innovative (BYOD: Bring your own device, 2014). They can work whenever and wherever they want and don’t have to be in their desk to do their office work. BYOD programs also help in saving money but shifting the cost to the user, with employees paying for their device and data services (BYOD: Bring your own device, 2014). Employees would be satisfied if they use the device they have chosen and invested in rather then what was selected by IT (BYOD: Bring your own device, 2014). The key way of this concept is about allowing the staff to take and use their own device is seen as employer being open-minded and flexible. The new generation prefers to work in the flexible environment where his or her bosses...
Words: 1110 - Pages: 5
...Case Study 1 Bring your own device (BYOD) Cynthia Lopez Networking Security Fundamental OCT. 26, 2015 Good news now your company has bring your own device program so you can finally use your phone that has more capability than the boring company’s phone. Now you can you can use your new shiny iPhone for work. You can now even check your corporate email from home and stream YouTube videos too all while your company splits the bill. Will now that it all seem great and you are happy to join the company’s bring your own device you wake up reach for your phone to check your emails but it doesn’t turn on its become a brick! You do some family investigation you realize that the little one tried to guess your password and entered it wrong several times your company’s security policy shut down your phone to keep sensitive material from unauthorized access. Your phone is brought back to life and restored but realize now that all your pictures are lost and any notes you might have saved on your phone. It is gone forever. (The Dark Side of BYOD) pg1. Many employees are shocked to know that their personal devices can be asked to be surrendered. In bring your own device companies can track you using GPS on your device to track your whereabouts. Selectively disable camera and microphone when the device enters restricted company areas to prevent sensitive data loss. Online activity can also be monitored to protect the company from any liability arising from an improper...
Words: 663 - Pages: 3
...Bring your own device Victor Morgan CIS330 Strayer University Bring your own device As practice shows, a growing number of employees use at work their own mobile devices. This year, many tech sites are increasingly flashes by acronym BYOD (Bring Your Own Device) – “Take your own devices to work”. As of today, when it is posible connect to different cloud services and harness the power of personal device to perform the work steps, literally holding the phone, and the range of devices has become a truly enormous, sometimes for an employee computer standing on his desk has no value. With the ability to perform the same work tasks, but with the help of his personal device employee, in practice, will seek to do so. The task of company IT-service – is to provide him such. BYOD (bring your own device) – is a term that describes a situation where an employee of organization instead of corporate computer uses to run his own device, whether it is his personal laptop, tablet, or, in extreme cases, even a smartphone. BYOD term appeared at least since 2004. However, the explosive popularity of this idea is found only recently and mainly due to the activity of suppliers of IT-services and the rapid development of functional diversity and cloud services. Today, the growing popularity of BYOD concept affects the number of positions in many areas of IT: from the technical support department to department of development of mobile applications and security management and monitoring of compliance...
Words: 1133 - Pages: 5
...Bring Your Own Device (BYOD) Bring Your Own Device (BYOD) There are pros and cons to a BYOD policy. Each company must carefully weigh both sides of the situation before making a decision. As the business world moves forward, there may be more companies using BYOD. There are some benefits to a BYOD policy. Having employees use their own devices can save the company money. Instead of buying devices for everyone, they can just buy them for the ones that need them, and the ones that work on projects that need more security. BYOD could also lower maintenance and IT costs, as users would be responsible for their own devices. Since storage would be accomplished via cloud storage, there would not be much risk to the company concerning lost files or shared files. Many users would probably welcome the chance to work on their own devices instead of company devices. Users may feel more comfortable using their own device which might lead to a more productive employee. There are still many risks involved with BYOD. The biggest risk is the possibility of lost files or someone loaning their own device to someone else. It is not uncommon for someone to pass their device around to different people. Another risk is that with BYOD, the company has to support several different brands of devices and also different platforms. The company may have to structure their company to accommodate this. The company also doesn’t have control over what items the employee puts on their device...
Words: 360 - Pages: 2
...info BRING YOUR OWN DEVICE (BYOD): SECURITY RISKS AND MITIGATING STRATEGIES 1 Prashant Kumar Gajar, 2*Arnab Ghosh and 3Shashikant Rai 1 Master of Science-Cyber Law & Information Security Indian Institute of Information Technology-Allahabad India prashant.developer@gmail.com 2* Master of Science-Cyber Law & Information Security Indian Institute of Information Technology-Allahabad India arnabghosh.ghosharnab@gmail.com 3 Master of Science-Cyber Law & Information Security Indian Institute of Information Technology-Allahabad India shashikant@iiita.ac.in Abstract: The growth of mobile technology, with regard to availability of 3G/4G services and devices like Smartphone’s has created new phenomenon for communication and data processing ability to do business. One such phenomenon that has emerged in the business environment is BYOD (Bring Your Own Device), which means that employees use their personal device to access company resources for work, inside or outside organizational environment. This new phenomenon brings with itself new opportunities but has many risks associated with it. Using mobile devices for personal as well as professional work brings with itself risks that need to be mitigated. The aim of this work is to provide various mobility strategies, defences and measures, control aspect, management and governance aspect to look forth in implementing a BYOD strategy in an organization. Keywords: Risk, Defences, Bring Your Own Device, Have Your Own Device...
Words: 6038 - Pages: 25
...Bring Your Own Device (BYOD) Michelle Cheek CIS/333 Prof. Roy Creasey April 20, 2016 Throughout the world today, personal communication devices are becoming more of a trend in within many organizations. With the policy Bring Your Own Device BYOD, organizations has begun to allow their employees and contractors to bring their personal or given handheld devices. Allowing employees to connect to the organizations network giving them access to company information and applications. Devices such as, laptops, smart phones, tablets are all being used in many organizations to complete many tasks while at work. There are many benefits with Bring Your Own Device. There is increased productivity “research also shows that employees are even more productive if the device they use is their own” (Wiech, 2016). The use of their own device helps employees to be more interactive with the task they complete. Cost is another benefit in which is lower because the organization don’t have to come out-of-the pocket for as many devices that most companies require. By employees using their own device cuts the price down on devices in the office it definitely cuts down spending in an organization. For instance, employees using their own...
Words: 815 - Pages: 4
...BYOD/Mobile Assignment The organization that I work for is in the computer hardware industry. The organization works with top computer technology companies like Dell, Apple, Ibm, and Microsoft. The organization I work for does the manufacturing and assembling of computer hardware and peripherals for those and other various computer companies. The components that are made in this industry include printers, Web and PC cameras, devices that are used for pointing, keyboards, monitors, and even storage devices.4 Computer components that use a semiconductor are not made in this industry. This would include things like a circuit board or a microprocessor. According to Oxford Dictionaries BYOD, which stands for bring your own device, is the practice of allowing the employees of an organization to use their own computers, smartphones, or other devices for work purposes.2 A large number of workers are bringing their own devices into their place of work...
Words: 1097 - Pages: 5
...Week 3 Case study BYOD has the potential for big cost savings because organizations that let employees bring their own devices to work don't waste money on corporate phones. Plus, when an employee can work from a device of his own choosing, it's more enjoyable than being forced to use a corporate-issued device. That means happier and more productive users. Another advantage of BYOD is that it supports a mobile and cloud-focused IT strategy. From their personal mobile devices, employees can access their work in the cloud, further improving productivity. The overall BYOD benefits are that they save the company money and they make workers happy. There are however four big BYOD risks. Think about how you'll pay for services. Users might pay for devices, but who's going to pay for the voice and data plans? There are a couple of ways you can handle cost-sharing, but it's important to pick one and get users to agree to it. You're going to have to draft acceptable use and security policies that include the consequences of violation. Then you need to train users and help desk staff on best practices and support. You'll have to know how to handle the biggest BYOD challenges, security. At a urban health plan inc their doctors travel a large hospital with their iThings, recording patient information, diagnostic data and preparing reports. The network travels with the doctor, following him or her throughthe building. When it’s time to print, the request is sent to the closest printer where...
Words: 341 - Pages: 2
...In this case study we explored a business strategy referred to as BYOD or Bring Your Own Device. This networking model allows a company’s employees to use personal devices of their choice when accessing and interpreting company data. This approach has mutual benefits with both the organization as well as the employee. These personal devices give the users increased mobility when accessing platforms within the organization from multiple locations. This proves useful when considering that some work can be taken home or to other places to be completed. In addition to Mobility, this method allows employees to use the programs they are most familiar with to complete tasks. This helps increase speed and accuracy of the employee’s efforts, thus increasing the company’s efficiency and productivity. One intangible benefit, in implementing the bringyourowndevice style, is that you have a much higher satisfaction rate with the employees, which helps boost morale. Another benefit is that the company incurs lower overhead costs associated with IT expenses such as hardware procurement and the maintenance associated with the hardware. The Bring Your Own Device to work model has many benefits, but it also has serious risks associated with those benefits. By using this model the organization is left vulnerable to outside influences. From my research on this topic I found that the organization is put at risk on several levels. When one considers how intricate and massive some networks are...
Words: 831 - Pages: 4
...BYOD (Bring Your Own Device): Hot or Not? Andrea Ferguson CGS1016-39433 BYOD is the hottest acronym in IT since ITIL. Professionals want to know what’s going on with BYOD, regardless of whether they’re on a team supporting such a program, considering adding such a program, already a part of a BYOD program or simply just interested out of personal curiosity. This paper will explore a few of the pros and cons of a BYOD program. Cisco sponsored a survey of 600 IT and business leaders. The results of this survey showed that 95% of their businesses permit corporate network access by employee-owned devices. Out of the 600 surveyed, 48% support a select list of devices, while 36% allow all devices. Additionally, 11% of those businesses allow employee-owned devices access to enterprise networks but do not offer any type of IT support. It’s clear that businesses have a drive to implement BYOD programs. It’s also clear that these programs are highly popular with both company and employee. Mobile devices, powerful yet inexpensive and easy-to-use tools, help employees to be productive regardless of their location. Collaborative efforts and information exchange can increase, allowing a business to step up their reaction to market changes and/or customer needs. Another plus is that virtually every employee owns some sort of personal mobile device. While mobile technologies use does have the potential to transform business, it can also disrupt IT. Today’s employee expects...
Words: 1194 - Pages: 5
...mobile devices, they increasingly use them to store and access a variety of personal information. In addition, my companies are utilizing mobile devices to increase productivity and collaboration among employees. As of December 2013 Google’s Android Operation System was the top smart phone platform with 52.5% of the market share ("iOS Continues Gaining U.S. Smartphone Share"). As these numbers continue to grow cybercriminals have taken notice and there has been an increase in the number of malware programs developed for the Android operating system. These malware programs can present a variety of threats from allowing criminals access to important personal information to intercepting private text messages and emails as well as even allowing someone to remotely turn on the phone’s mic. These threats can present a problem to both private individuals and businesses alike. It is important that steps be taken to prevent cybercriminals from accessing this information by preventing malware from being installed on these devices. If I was responsible for strengthening this area of IT security, I would recommend several steps. For starters, I would provide education to personal and business users to instruct them on the proper software to have installed in order to protect their devices as well as things to look out for and avoid. For businesses, I would recommend they employ strict guidelines for users of company equipment and dictate polices for users that bring their own devices. An...
Words: 803 - Pages: 4
...BYOD (Bring Your Own Device) is attractive for two main reasons. It increases employees’ satisfaction, by allowing them to purchase (and use) whichever device they prefer, and it reduces company’s expenditure on purchasing equipment, and on carrier costs. However, BYOD may incur further costs on the company and leave it exposed to security threats . On the costs front, employees bear the costs of the devices without benefiting from their company’s buyer power (to secure discounts, for example). Furthermore, in BYOD, companies usually pay for data packages for devices that are completely owned by the employees, and since devices are used for personal use, unexpected payments might occur. Thus those data packages may not always completely cover business usage. On the administration side, BYOD may require MDM (Mobile Device Management) services, which are usually provided by a third party, to ensure compliance with organization policy, handle mobile security, and separate between ‘business’ and ‘personal’ usage of the device. MDM services are also required in COPE. Furthermore, IT helpdesk may be inefficient under BYOD policy ; with a wide range of devices used and no standard device policy, help desks may either be less productive due to inability to support devices, or take longer time to complete services due to inexperience with particular apps and/or devices. BYOD approach bears significant security concerns. The primary risk is that personal devices might infect the company...
Words: 699 - Pages: 3
...Intel BYOD Assignment Questions 1. Does BYOD increase productivity in workplaces? 2. Should it be encouraged or discouraged? 3. How might other firms benefit from Intel’s approach to security (as shown in case Exhibit 2)? 4. How can Intel turn BYOD into a new source of competitive advantage? 5. What decisions can Intel make to ensure security of the corporate data on an employee-owned device that is used in the workplace? 6. How should Intel manage BYOD in the face of its e-Discovery obligations? Pasted from Role: Malcom Harkins, chief information security officer was facing dilemnas in taking forward the Bring your own device initiative. - By 2014 at least 70% of employees would be using their own device for at least part of their job. Issue - The difference between personal data and corporate data… was no longer limited to office hours, just as peronal data was no longer off-0 limits during office hours - Employees would be distracted by applications embedded into their devices, which could potentially lead to a negatice impact on productivity - Greater risk in data security - Intel neded control over to access and control company info.. But doing so on employee devices would violate privacy Benefits - Reduced intel's hardware cost because employees bought their own hardware but increased cost in supporting , configuring those devices - Lower cost in data because telecom charged 33% less for personal vs corp data.. Approaches - Do nithng.. And hope that bringing in own devices...
Words: 527 - Pages: 3
...Mobile devices in workplace Name Institution Course Instructor Date Concerns about mobile devices * Mobile devices are distracting and make people waste time in workplace. Flitting between numerous screens and apps and continuously checking email is enough to disrupt even the most focused employee. * Loss of important corporate data stored in the employee’s mobile device due to attacks is one of the greatest concerns. The employee keeps using personal device for corporate data as it is convenient to work from there but in case of system attacks, the data may be lost or stolen * Access to the company’s critical and confidential data by unauthorized people due to attacks by malicious people on the mobile devices. This happens mostly because it is difficult to enforce security measures on each and every employee’s mobile device and it being difficult to ban their use in workplace Ways of dealing with the issues The BYOD (Bring Your Own Device) sensation is extending at an amazing rate. It is something that influences each business, from the littlest to the biggest. How every business is managing BYOD ranges from complete lack of concern to a full grasp of it with complex techniques and controls set up to augment worker profit while minimizing danger to the business. Each one organization ought to have such regulations. There are steps you can take to place forms set up, and devices to authorize components of those techniques, that will...
Words: 2085 - Pages: 9