Human factors influence polices in the BYOD practice in the workplace because for the most part employees are comfortable and prefer using their own devices compared to company issued devices as they can often multitask between personal and business access. The use of mobile devices comes with the consequences of the device being stolen, lost and exposed to threats. The possibility of these devices falling in the wrong hands or stranger not authorized access to data could result to harmful software application being uploaded or downloaded which could infect the device and compromise the network. The use of public and unsecure WIFI connection is also an easy avenue for mobile devices to get infected with viruses, malware and even hacked, therefore
diffusion of the BYOD (Bring Your Own Device) phenomenon. BYOD is the latest trend hitting businesses where employees are bringing their own personal mobile devices. Some of these devices include smartphones and tablets which are brought into their place of work, and used on the corporate network for purposes such as accessing files, email servers, and databases. Over the past few years, employees in many organizations are bringing their own personal devices to the work
The importance of mobile phones both to individuals and corporate organizations can never be underestimated. These devices are put to different uses that would have been almost impossible without them. Innovation is the order of the day when it comes to mobile phones as designers seek to meet the different needs of customers in the market. Yet these devices come with great risks particularly when it comes to corporate data that may be stored in them. The range of security threats that face mobile phones is as a result of several vulnerabilities found commonly in the devices. The vulnerabilities are partly the result of poor technical controls and partly poor user security practices. Besides basic user requirements, other security challenges facing companies with regard to the use of mobile phones include business to business spaces; business to customer spaces and business to employees as these devices are different from the common desktop classic environments.
"The period of the PC has finished. Representatives are turning out to be more portable and searching for approaches to still be associated wherever work should be done," said Phil Redman, research VP at Gartner. "The accommodation and profitability picks up that cell phones bring are excessively enticing for most organizations and their representatives. Securing corporate information on cell phones is a major test, however one those organizations must grasp. Ventures are battling with how to bolster and secure this dynamic
So to begin an examination on criteria of Enterprise System Security I chose a theme that is "Present to Your Own Device". BYOD (bring your own gadget) is the expanding pattern toward worker claimed gadgets inside of a business. Cell phones are the most widely recognized case yet representatives additionally take their own Tablets, Laptops and USB crashes into the working environment. BYOD is one of the most sweltering subjects in big business security. Notwithstanding diminishing an association 's general expense of innovation, representatives are allowed and enabled to utilize their favored gadget stages, advancing higher efficiency levels all through the workforce
Smartphones exploded on the business scene in the mid 2000s. They provided the convenience of accession of vital information from anywhere. According to Sharia Panela’s article for GMA News , “between 2007 and 2012, small and medium businesses reported steadily increasing web attacks. Malware, phising, and other types of violation surged by 35 percent while email attacks soared by 12 percent” (Panela). All of these types of attacks are in a large part due to the lack of security on mobile devices.
All the businesses which hold BYOD policies should have additional security measures in order to protect them from cybercriminals and finally ensure that the network is free. There is great amount of pressure on IT department as every employee hold different varieties of devices and should ensure that device is meeting all the security standards.
Technology is constantly advancing, which causes a need for mobile and wireless networks. However, the creation of mobile and wireless networks causes a need to increase security protocols and measures. Cell phones are now being used for sensitive work information, as well as laptops. Many people have the capability of working from home by using laptops issued by their employers. Using a home or public network is not always safe, it does not have the security and systems to monitor the network and access. Before any work is done on these devices the proper security needs to be in place such as firewalls, pop-up blockers, and private network connections. However, there are both advantages and disadvantages to the use of wireless networking and what is will be like in the future.
BYOD is an increasing trend toward employee-owned devices within a business. BYOD is the acronym for Bring Your Own Device. Some industries are adopting BYOD quicker than others. There are both advantages and disadvantages of implementing BYOD in the workplace. Most employees are already using their personal devices in the workplace. These employees store personal information as well as company data on their devices. Although there are a variety of benefits to allowing users to supply their own devices, it also raises significant data security and privacy concerns. It is vital for any organizations to understand these benefits and concerns.
Bring-your-own-device, or BYOD, has increasingly become an accepted practice for corporate IT. With its purported productivity gains come with a whole new set of security concerns for IT departments and management. Principal among these is security, where much of the control that IT traditionally had is now in the hands in the users.
To protect an organisation’s information security, security policies are implemented to guide employee actions. Companies’ information security efforts are often threatened by employee negligence and the resistance of employees to comply with implemented security policies. With the introduction and popularity of mobile devices, the importance of following security policies has become increasingly important. The need to include the risk associated with the use of mobile technologies within security policies is now imperative to an organisation’s security. This study analyses the effectiveness and ineffectiveness of security policies through previous literature and introduces a guideline for organisations to control the use of mobile technologies. This study will also focus on one policy specific to the organisation Commbank Australia and provide insight into adapting the policy to fit mobile technology use.
The use of mobile devices in the workplace may provide convenience; however, securing and regulating the use of mobile devices within the workplace is critical for safe and efficient business practices. As a result, Edu Corp continuously recommends security software and applications for employee mobile devices, assures all mobile security components are up-to-date, encrypts data on mobile devices, as necessary, requires password protection on mobile devices used for business-related tasks, encourages employees to be aware of their surroundings, along with potential security vulnerabilities, sets strict communication strategies and standards, employs a solid system for handling and/or recovering
Bring your own device (BYOD) is beginning to be the order of the day in a Cooperate world. It has been proven According to research conducted in 2012 by Intel on 3,000 IT managers and 1,200 users on how the use of BYOD in their organisation has been increasing and its benefits to the organisation. Among the benefits of BYOD to an organisation is increase in productivity, Employees of BYOD are more flexible and can work seamlessly across their personal user space over their work space. While considerable evidence and research suggest that BYOD can offer flexibility, increase in productivity and efficiency the information security risk that might arise from the use of the BYOD may outweigh all its benefit if there is no proper implementation of BYOD formal policy in place.
Since BYOD devices are basically networking devices, they are as susceptible to cyber attacks as any type of personal computers/laptops. Threats and cyber attacks includes spam, phishing, vishing (VoIP phishing), unauthorized data transmissions (or information leakage), etc. These threats access BYOD devices as malwares in the form of regular applications or games, but are also used to access unauthorized data [1].
Within this Briefing Paper, the topic of Bring Your Own Device, in short “BYOD”, will be explored in regards to how it fits in to current day corporate and educational environments, and why it will be a primary focus in future IT strategies. The importance of it will be signified and why it is a major advantage for IT departments and users, and the policies governing BYOD and why they need to exist for an IT department to effectively support users and their devices. Benefits of cost reduction, comfortability through BYOD are contrasted against concerns of security, platform commitment and integration approach, and ultimately why BYOD is an exciting prospect for the future with a current large uptake that is continuing to grow year
Bring your own device (BYOD) includes permitting employees to bring their own particular gadgets, into workplace to bolster enhancing results. IT companies are starting to see the capability of BYOD to achieve more focused, dynamic results. In spite of the fact that lone a little number of Irish companies is utilizing BYOD, mindfulness and selection is developing.