Some organizations have implemented bring your own device (BYOD) policies. This enables organizations to save money on equipment costs because employees are now using their personal computers. At the same time, BYOD policies also present challenges for organizations. Now organizations are in the business of supporting personal computers.
Go to Basic Search: Strayer University Online Library to locate and integrate at least two quality, academic resources (in addition to your textbook) on BYOD policies and the challenges associated with them. You may also use government websites, such as Cybersecurity from the National Institute of Standards and Technology.
Please respond to the following in a post of at least 200 words:
In 60 to 75 words, please respond to at least one other post. Choose to respond to those who have few or no responses.
Post from Austyn that you have to respond
Hello professor and classmates,
I hope everyone is doing great this week. This week has been a struggle still. Please keep us all in your prayers.
Many companies currently allow you to BYOD. There are pros and cons of BYOD, and they are very evident. Many companies feel that this option is desirable as it allows them to reduce costs. There are some advantages to allowing employees to BYOD. It will help reduce administrative support of devices and usually leave IT resources vacant to be able to support other organizational needs. It will also help to reduce equipment costs unless the organization is compensating employees for their devices. The organization will not own the devices, resulting in not being tasked to replace the lost or stolen device. The deployment time is much more accelerated as the user does bring their device, and the IT team no longer in charge of the deployment.
They are also several cons in regards to BYOD. Agreements in company policy may indicate who is responsible for personal devices’ support. However, the IT team will often find themselves spending support time fixing a device owner’s problem.
There may be the need for less management overhead on devices, but there is still a cost involved for the platform that allows for a BYOD environment to exist. Several examples are software cost and licensing. Understanding what devices are in the BYOD environment and making specific unauthorized devices are present takes incredible time and effective monitoring. The need to be able to support multiple OS platforms and hardware is a challenge and costly.
Data loss is a massive possibility since information copied to BYOD devices can be transferred to external destinations without the organization’s knowledge. A way to avoid this is to ensure the MDM policy does not allow e-mail and attachments to be copied to the BYOD. The inability to enforce wireless connection rules on personal devices provides a high potential for a user to connect to an insecure network. This will allow others to intercept or redirect traffic between the device and the organization’s network. Without total control over the device, the organization could be exposed to risk by devices with vulnerable software.
I enjoyed answering the discussion this week. I hope you all have a wonderful and blessed day!
Liwen Chen, Tung-Liang Chen, Hsu-Kuan Liu. Identifying Students’ Perception of Clickers via Bring Your Own Device (Byod) in Flipped Classrooms. International Journal of Organizational Innovation. 2020;13(1):105-117. Accessed February 1, 2021. https://search.ebscohost.com/login.aspx?direct=true&db=bth&AN=144310451&site=eds-live&scope=site
Kang Q, Xue L, Morrison A, Tang Y, Chen A, Luo X. Programmable In-Network Security for Context-aware BYOD Policies. 2019. Accessed February 1, 2021. https://search.ebscohost.com/login.aspx?direct=true&db=edsarx&AN=edsarx.1908.01405&site=eds-live&scope=site
Week5 Discussion CIS 512: Advanced Computer Architecture
Although organizations are slowly adapting to the trend of letting their employees use their own devices such as laptops to access their IT systems, many remain uncomfortable with this practice. This is understandable given the challenges that organizations have on this front. One of the challenges that organization may face with implementing BYOD is physical theft. The chances of losing a personal device is greater when compared to losing a device owned by an organization (Brodin, Rose & Åhlfeldt, 2015). This aspect provides little comfort for the IT team responsible for safeguarding sensitive corporate data. Placing control on personal devices has the implication that unauthorized individuals can access sensitive firm data. To mitigate against this threat and challenges, it is recommended that IT implement security controls which employees must utilize every time they want to access company information form their devices.
Another challenge that organizations face when it comes to implementing BYOD is privacy concerns. That is, with use of personal devices, there is the risk that that personal information forms these devices may overlap with corporate data. This can infringe upon the privacy of employees causing more challenges to the human resource department. In this case, what an organization may do is to set policies that would guide on access of information on personal devices used for work (Olalere, Abdullah, Mahmod & Abdullah, 2015). This would ensure that employees are aware of the guidelines and processes to prevent overlap of personal and corporate data. Despite these challenges, some of the advantages that organizations face implementing BYOD is reduces costs on equipment. That is, with employees using their devices, companies spend less on such devices hence cost effective.
Brodin, M., Rose, J., & Åhlfeldt, R. M. (2015). Management issues for bring your own device. In European, Mediterranean & Middle Eastern Conference on Information Systems 2015 (EMCIS2015), 1-2 June, Athens, Greece. European, Mediterranean & Middle Eastern Conference on Information Systems (EMCIS).
Olalere, M., Abdullah, M. T., Mahmod, R., & Abdullah, A. (2015). A review of bring your own device on security issues. Sage Open, 5(2), 2158244015580372.
It must be particularly daunting task for the IT department to ensure that personal devices used at work pass the security checks and are protected from malware. This is further complicated with the fact that the company has no authority if limited for instance application or websites that an employee visits which to be honest can increase the risk of hacking. What are some of the recommendations for a company to improve the security when implementing BYOD?
Thanks for sharing.
Delivering a high-quality product at a reasonable price is not enough anymore.
That’s why we have developed 5 beneficial guarantees that will make your experience with our service enjoyable, easy, and safe.
You have to be 100% sure of the quality of your product to give a money-back guarantee. This describes us perfectly. Make sure that this guarantee is totally transparent.Read more
Each paper is composed from scratch, according to your instructions. It is then checked by our plagiarism-detection software. There is no gap where plagiarism could squeeze in.Read more
Thanks to our free revisions, there is no way for you to be unsatisfied. We will work on your paper until you are completely happy with the result.Read more
Your email is safe, as we store it according to international data protection rules. Your bank details are secure, as we use only reliable payment systems.Read more
By sending us your money, you buy the service we provide. Check out our terms and conditions if you prefer business talks to be laid out in official language.Read more