Preview

Bring Your Own Risk In BYOD: Article Analysis

Powerful Essays
Open Document
Open Document
934 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Bring Your Own Risk In BYOD: Article Analysis
According to the article “Bring Your Own Risk in BYOD,” the author points out the MDM solutions as well as lessons learned on BYOD implementation. The lessons learned in this article emphasized the security that should be put in place or the measures that organizations need to take in order to operate in a safe and positive environment with BYOD. The Mobile Device Management (MDM) solution, which is part of the Enterprise Mobility Management (EMM), employs solutions to manage risks which allow employees to use their mobile devices to access organizations’ services and data.

Moreover, the article “Maximize Productivity and Minimize Risk with Mobile Management” dives more into the MDM software on personal devices. Concerning MDM, companies need to make sure employees using mobile or personal devices are following the company’s security standards. Millman’s (2017) article found the following:
Mobile Device Management (MDM) suppliers are responding are responding to this with reverse enrolment flows where a user can download the initial
…show more content…
They explain the ethical ethical debates of MDM software on personal devices, discussed the lessons learned from BYOD implementations, as well as the extent of intrusion of a BYOD policy. We learned a great deal of all the sources chosen. For example, there are many benefits in implementing BYOD such as cost saving, health and productivity of employees, as well as new technology implementation. But BYOD implementation does have bottlenecks especially when it comes to MDM software on personal devices. Corporations need to take security measures to ensure their data are protected. Also, from the CIA (Confidentiality, Integrity, and Availability) triad, availability is more supported in the BYOD program whereas Confidentiality and Integrity present some hurdles as it might be challenging to cover these two when it comes to sharing information and who have access to the

You May Also Find These Documents Helpful

  • Best Essays

    “Making Mobile Devices, Cellular Devices More Secure.” (November 8, 2009). Retrieved on September 7, 2012 from…

    • 3710 Words
    • 15 Pages
    Best Essays
  • Better Essays

    Week 10 Term Paper

    • 3259 Words
    • 10 Pages

    In this term paper, I will assess the effectiveness and efficiency mobile-based applications provide to capture geolocation data and customer data, and quickly upload to processing server without users having to use a desktop system. Next, I will evaluate benefits realized by consumers because of the ability to gain access to their own data via mobile applications. Following the examination the challenges of developing applications that run on mobile devices because of the small screen size. Then I will describe the methods that can be used to decide which platform to support. Afterward I will discuss ways of providing high availability given that a mobile application requires high availability because of end users needing to have continuous access to IT and IS systems. Last but not least, I will discuss methods of making mobile devices more secure, since mobile devices are subjected to hacking at a higher rate than non-mobile devices.…

    • 3259 Words
    • 10 Pages
    Better Essays
  • Satisfactory Essays

    The IT department along other members of the governance committee will need to meet to develop standard protocols, policies and guidelines that clearly communicate the BYOD expectations. Employees need to fully understand that the use of an MDM platform allows FRH to access their device…

    • 433 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Effective BYOD Policy

    • 204 Words
    • 1 Page

    Identify which devices are permitted: What works for one organization might not work for others. If at an organization, the employees are provided company Blackberry device and computers for work, it is advised when considering a BYOD it can’t be expected that everyone will have a personal blackberry cell phone. It is feasible when other cell phones like Apple and Android are allowed. There should be specific policies identified for different OS. Since there are so many phone choices in the market.…

    • 204 Words
    • 1 Page
    Satisfactory Essays
  • Better Essays

    Increasing its security may include purchasing programs such as Absolute Software, which would allow the company to remotely wipe devices. Since employees may use more than one personal device on the job, the company will have to account the cost of the software for about 250 devices, the software costs about $100 dollars each; which would add up to $2,500. Also, SHHC may want to create a separate body in their organization that will monitor the devices. This body will help enforce the company’s new BYOD policy, by for example making sure that all the devices are protected and that the data on those devices are encrypted. It will also be responsible of locating the lost devices, remotely wiping the data on them, or even monitor the traffic emitted by the devices. Creating this completely different sector in the organization will have a cost that will amount to about $5,500 or $8,000 total. Due to these measures, the Annual Rate of Occurrence is expected to drop by 3%, making the residual annual risk to be of 7%. If we add the $8,000 to the $375,000, it will create the new SLE of $383,000. Therefore, the new ALE will be of $26,810. This would reduce the costs from the initial risk by $10,690 if an event were to…

    • 1967 Words
    • 8 Pages
    Better Essays
  • Powerful Essays

    Ever since the introduction of the first mobile computer device, there has been a growing need and want for more and more mobile computing devices. Once users got the first taste of harnessing the power of the mobile device that was all they needed. Today, you cannot walk down any public road or walk into a public building without seeing users talking and connecting to the internet via mobile devices.…

    • 3826 Words
    • 16 Pages
    Powerful Essays
  • Better Essays

    Week 7 Research Paper Sun

    • 1241 Words
    • 4 Pages

    M.A. Badamas, (2001),"Mobile computer systems - security considerations", Information Management & Computer Security, Vol. 9 Iss: 3 pp. 134 – 136…

    • 1241 Words
    • 4 Pages
    Better Essays
  • Good Essays

    Current Event

    • 670 Words
    • 3 Pages

    More than 90 percent of American adults own a mobile phone, and more than half of the devices are smartphones. But “smartphone” is a misnomer. They are personal computers that happen to include a phone function, and like any computer they can store or wirelessly retrieve enormous amounts of personal information: emails, photos and videos; document files; financial and medical records; and virtually everywhere a person has been.…

    • 670 Words
    • 3 Pages
    Good Essays
  • Satisfactory Essays

    Fire Truck Crash

    • 318 Words
    • 2 Pages

    The consequences of losing a smartphone or other mobile device are significant because these devices store personal and business data. The goal, therefore, for mobile devices users is to make their…

    • 318 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    This article provides a comprehensive analysis of the current shape of the mobile market and increased security concerns…

    • 781 Words
    • 4 Pages
    Good Essays
  • Powerful Essays

    Byod

    • 3852 Words
    • 16 Pages

    “Bring Your Own Device” (BYOD) Initiatives Enable Clinical Transformation ....................................1 Physicians are Eager to Use Mobile Solutions at the Point of Care ..................................................1 Hospital IT Faces Significant Challenges to Support Mobile Solutions ............................................2 Hospital IT Requires Next-Generation Networking Management Solutions to Support BYOD ........3 Customer Story: Henry Ford Health System ......................................................................................5 Customer Story: Western Maryland Regional Medical Center .........................................................6 Conclusion .........................................................................................................................................7 For Additional Information ..................................................................................................................7…

    • 3852 Words
    • 16 Pages
    Powerful Essays
  • Powerful Essays

    Mobile Computing

    • 1913 Words
    • 8 Pages

    Mobile computing has become a fixture in our everyday lives. As of today, people throughout the world can use their mobile devices to do anything that they would normally do on a laptop or a personal computer. At this point, there are no foreseeable bounds where mobile technology is concern. The healthcare industry is now realizing this fact and has decided to implement mobile technology within their industry. While still in the early stages of implementing mobile technology within the healthcare industry, there are many things to consider, and questions to ask. Within this paper, I will answer such questions as patient information accuracy, security issues, advantages and disadvantages of using a mobile device and the impact the social media has within the healthcare industry.…

    • 1913 Words
    • 8 Pages
    Powerful Essays
  • Better Essays

    Mis on Your Pocket

    • 1979 Words
    • 8 Pages

    The kinds of applications that are described in this case study are as simple as e-mail, calendar, photo sharing, and text messaging applications to applications like the one used for MEDITECH electronic medical records system, Epocrates Essentials, ChainLinq Mobile, and the app developed by Timothy Childs to help control machines in his business. These types of applications help employees stay better kept up with each other and business information. The e-mail application allows employees to receive e-mails almost directly after they are sent. The MEDITECH application gives doctors the ability to look at things like medical records and results whenever they need to and where ever they are. Also being able to access applications like Epocrates Essentials helps them understand the results and get more medical information. Basically, all the applications described help support business functions like timeliness and punctuality. These application help improve operational efficiency because they improve the speed of the information being communicated in businesses. This allows the businesses to operate faster and helps decision-making be done quicker which will help companies avoid potential problems or fix problems that are happening faster.…

    • 1979 Words
    • 8 Pages
    Better Essays
  • Better Essays

    Mobile Cloning

    • 4202 Words
    • 17 Pages

    The security management service is responsible for providing a safe environment for both the operation and management of resources in a domain [14, 15]. Safety and Security are two reliability properties of a system. A ‘safe’ system provides protection against errors of trusted users, while ‘secure’ system protects against errors introduced by untrusted users [1]. A comprehensive network security plan must encompass all the elements that make up the network and provide important services: Access (authorized users), Confidentiality, (information remains private), Authentication (sender is who he claims to be), Integrity (message has not been modified in transit) and Nonrepudiation (originator cannot deny that he sent the message) [4]. Our main objective is to augment the security in telecommunication networks, avoiding frauds of cloned mobile phones. In order to…

    • 4202 Words
    • 17 Pages
    Better Essays
  • Good Essays

    My final year project was Anisham’s Mobile handling Application. The Anisham is a security product which is developed by Navkar Infotronics, Baroda (India). Anisham is the Security System. Anisham mobile handling application is a Mobile application that supports a security System named “Anisham” by communicating with “GSM” device in the system, So that it can be operated and configured the system through mobile application. We…

    • 719 Words
    • 3 Pages
    Good Essays