Preview

The Byod Security Risk

Good Essays
Open Document
Open Document
1158 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
The Byod Security Risk
The BYOD Security Risk

Introduction
The introduction of mobile devices in the workplace has been on the rise and there is no denying that these devices are transforming how companies do business. This has introduced the BYOD or Bring Your Own Device model in the workplace and its becoming more popular every day. BYOD is a policy that accepts employees bringing personally owned mobile devices to their workplace and using them to access company data such as email, file servers and databases as well as their personal applications and data. But as data transmissions increase with these devices so does the chances of them being hacked and the burden of successfully managing the mobile devices is laid upon the IT departments. One of the real underlying issue with BYOD and mobile security is the that people in IT, compliance and internal audit aren't willing to stick their necks out and try to enforce their mobile security policies or enforce an effective Enterprise Mobility Management solution.

First Section Title goes here
Enterprise Mobility Management can be described as the set of people, processes and technology focused on managing the increasing array of mobile devices, wireless networks, and related services to enable broad use of mobile computing in a business context. Enterprise Mobility can be broken down into 2 parts Mobile Application Management and Mobile Device Management. In short Mobile Application Management or MAM is the use of secure application to connect employees to Crop data and the application secures the data from other apps on your phone. Mobile Device Management or MDM takes a centralized approach and installs an application on the mobile device and the software allows you to use all your native apps to access Crop data and email and is managed from a centralized server. Both these examples of Enterprise Mobility Management have their own pros and cons but provide solid solution to the mobile security issues in the workplace.

You May Also Find These Documents Helpful

  • Powerful Essays

    Task 3

    • 4254 Words
    • 17 Pages

    Complete a thorough analysis of the mobile device policies. Periodically examine mobile device usage and identify security risks/threat.…

    • 4254 Words
    • 17 Pages
    Powerful Essays
  • Good Essays

    The network administrator and the network security administrator need to be aware of these types of products and how they can be used to create low-cost covert networks in the workplace. The administrators need to be aware of the push-to-talk feature on cell phones and understand, for example, that sensitive documents can be leaked by the use of cell phone cameras. The administrators not only need to be aware of these technologies, but they need to update their policies and procedures so they can take legal action against employees who leak information.…

    • 11068 Words
    • 45 Pages
    Good Essays
  • Powerful Essays

    Nt1310 Unit 1 Assignment

    • 4104 Words
    • 17 Pages

    However, there is growing interest in protocols and other mechanisms for use with novel telecommunications services. Next-generation value-added services are bound to introduce new vulnerabilities. The interaction between all these communications and security protocols, and the mechanisms used for distributed systems security, is fertile ground for both interesting research. Ways to enhance these protection tools to make sure our technology is safe from IT attacks are evolving all the time. The systems or measures used to protect a company system at present might not be of any use in the future as technology is always enhancing to higher levels. Telecommunication businesses tend to be comparatively adept at managing information security risks. And many are taking action to achieve an enhanced level of ongoing insight and intelligence into ecosystem vulnerabilities and dynamic threats. Companies like Celcom must be ready to invest in this expensive research so as to be able to aggressively compete in the intense telecommunication market and to be able to sustain itself in this industry. Today, information security is a discipline that demands advanced technologies and processes, a skill set based on counterintelligence techniques, and the unwavering support of top executives. As telecom operators become more similar to technology companies, they will face a raft of new challenges. Core practices like employee awareness and training, policies and tools to reduce insider risks, and protection of data, including intellectual property, will need to be updated. The confluence of mobility, cloud, and social networking have multiplied risks, yet few operators have addressed these threats or deployed technologies that monitor user and network activity to provide insight into ecosystem vulnerabilities and threats. These…

    • 4104 Words
    • 17 Pages
    Powerful Essays
  • Best Essays

    There are thousands of applications that have been developed for mobile devices which perform a myriad of tasks and processes. In the beginning most of these applications were games. Businesses later joined the mobile revolution and developed their own business based applications to run on these mobile devices. Many mobile business applications can now streamline business processes, reduce operational processing times and provide better customer service. The mobile revolution has forced many industries to reengineer their business processes…

    • 3576 Words
    • 15 Pages
    Best Essays
  • Best Essays

    “Making Mobile Devices, Cellular Devices More Secure.” (November 8, 2009). Retrieved on September 7, 2012 from…

    • 3710 Words
    • 15 Pages
    Best Essays
  • Satisfactory Essays

    The IT department along other members of the governance committee will need to meet to develop standard protocols, policies and guidelines that clearly communicate the BYOD expectations. Employees need to fully understand that the use of an MDM platform allows FRH to access their device…

    • 433 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Effective BYOD Policy

    • 204 Words
    • 1 Page

    Identify which devices are permitted: What works for one organization might not work for others. If at an organization, the employees are provided company Blackberry device and computers for work, it is advised when considering a BYOD it can’t be expected that everyone will have a personal blackberry cell phone. It is feasible when other cell phones like Apple and Android are allowed. There should be specific policies identified for different OS. Since there are so many phone choices in the market.…

    • 204 Words
    • 1 Page
    Satisfactory Essays
  • Better Essays

    For the past couple of years, a policy that allows employees to bring their own personal devices to work has become progressively popular. This policy is known as BYOD, an acronym that stands for “bring your own device”. One of the main reasons for the growing usage of the policy is the increase in employee productivity as they are already familiar with the equipment they are using at work. Although this reliance on technology is efficient and produces numerous benefits in the business sector, it also brings several problems along with it. Certainly, the risk of losing valuable data has become an imposing threat nowadays, making…

    • 1967 Words
    • 8 Pages
    Better Essays
  • Best Essays

    Starbucks/Itunes Partnership

    • 4719 Words
    • 19 Pages

    Mobile Technology is expanding daily. It seems to be one of the fastest growing kinds of technologies in the news today. With the advancements in Personal Area Networks (PAN) and Wireless Access Protocols (WPA) mobile devices of today can be developed that are more secure than ever. They can be more accessible than ever before and provide faster and more accurate data transfer. The uses for the mobile devices have begun to expand into more and more areas of daily life. The iPhone mobile phone developed by Apple, Inc. is one of the most popular and bestselling mobile phones on the market today. In order for the iPhone to be at the head of the industry several of the most important technological features are…

    • 4719 Words
    • 19 Pages
    Best Essays
  • Best Essays

    Ninety-six percent of consumers have researched a product or service on their device, and thirty-five percent have made a purchase on their phone (Ansaldi, 2013). This trend between smartphone and consumer has raised the idea that the workforce should also follow suit in order to adjust to the habits of modern employees when they have been removed from the workplace. The entire idea surrounding BYOD holds that people become so attached to their personal devices that they prefer their own technology to foreign technology. The use of one’s own technology, as a result, would cause employees to be more productive all whereas they ensure the safety and upkeep of their personal work-related devices. Heralding back to vast use of smartphones to access the internet, most employees send e-mails and produce work-related documents while being off of work (they may or may not be using their smartphones to do this). A BYOD policy would only lessen the gap between job-related work that has been saved at home and job-related work saved on a company computer. Why not make things easier and have everything saved in one place? Companies see this trend as even greater an opportunity to implement BYOD programs, albeit with specific…

    • 1383 Words
    • 6 Pages
    Best Essays
  • Satisfactory Essays

    Students, especially college students, are consistently on some type of social media site or on a mobile device that gains them that type of access. There are many varieties of devices such as tablets, smartphones, laptops, and now even smartwatches. Devices such as these are connecting to wireless networks whether it’s from a service provider or campus. With these connections many aren’t just using them for social media, but also for checking grades, schedules, or relevant news. The devices depend on connecting to networks but also need to do so in a secure fashion. Each device has to be checked for viruses, spyware, and other types of malware while still maintaining the C-I-A triad. A balance must be found between usability and security. Each time a remote device is connected to the network there is a possibility that the network can be compromised by one these devices. Every device should be authenticated, scanned, and identified. Many are unaware of the risks that can come from connecting to networks, especially wireless access.…

    • 650 Words
    • 3 Pages
    Satisfactory Essays
  • Powerful Essays

    Ever since the introduction of the first mobile computer device, there has been a growing need and want for more and more mobile computing devices. Once users got the first taste of harnessing the power of the mobile device that was all they needed. Today, you cannot walk down any public road or walk into a public building without seeing users talking and connecting to the internet via mobile devices.…

    • 3826 Words
    • 16 Pages
    Powerful Essays
  • Good Essays

    Current Event

    • 670 Words
    • 3 Pages

    More than 90 percent of American adults own a mobile phone, and more than half of the devices are smartphones. But “smartphone” is a misnomer. They are personal computers that happen to include a phone function, and like any computer they can store or wirelessly retrieve enormous amounts of personal information: emails, photos and videos; document files; financial and medical records; and virtually everywhere a person has been.…

    • 670 Words
    • 3 Pages
    Good Essays
  • Satisfactory Essays

    Fire Truck Crash

    • 318 Words
    • 2 Pages

    The consequences of losing a smartphone or other mobile device are significant because these devices store personal and business data. The goal, therefore, for mobile devices users is to make their…

    • 318 Words
    • 2 Pages
    Satisfactory Essays
  • Better Essays

    Mobile Cloning

    • 4202 Words
    • 17 Pages

    The security management service is responsible for providing a safe environment for both the operation and management of resources in a domain [14, 15]. Safety and Security are two reliability properties of a system. A ‘safe’ system provides protection against errors of trusted users, while ‘secure’ system protects against errors introduced by untrusted users [1]. A comprehensive network security plan must encompass all the elements that make up the network and provide important services: Access (authorized users), Confidentiality, (information remains private), Authentication (sender is who he claims to be), Integrity (message has not been modified in transit) and Nonrepudiation (originator cannot deny that he sent the message) [4]. Our main objective is to augment the security in telecommunication networks, avoiding frauds of cloned mobile phones. In order to…

    • 4202 Words
    • 17 Pages
    Better Essays

Related Topics