Post on 30-Dec-2015
BYOD- Bring Your Own Device
Understanding the benefits and the risks.
Phillys Yang Alex Verblen Aaron Chung Michael Lyons
Without BYOD
With BYOD
A device utilized for communicative and informational purposes in the workplace and personal life.
Some prominent examples include:
Smartphone iPad Laptop Tablet
What is BYOD?
Technological mobility has fostered a significant impact in most business environments.
Ability to remotely create and consume information essential for business operations, and BYOD enables this process.
Understand and more importantly have access to tools and resources of a world-wide network imperative to a company.
Why BYOD?
Employees’ experiences are important. Freedom to choose their own device.
In the Work Environment
BYOD!
“The way we work is changing fast.
People adapt differently.”
2007: there was an increased rate at which companies began accepting and implementing BYOD.
Market Trend
Creates a liberal-minded environment for potential employees.
Each associate’s technological needs differ at InsureAll, BYOD allow workers to tailor their devices to their individual needs.
Corporate systems and data become more accessible than ever.
A Few Benefits
Mobile devices are becoming more affordable.
Not having to provide devices to employees means one less cost for InsureAll.
BYOD is a promising system to increase productivity.
Benefits (cont.)
Mobile devices offer little protection.
Risky Viruses & Malware
Risking data loss Risky viruses and malware Uninvited
guests/Hackers/Intrusions
You Can’t Protect What You Don’t Know
Source: www.zdnet.com
4753
BYOD Problems
SecurityOther
Understanding and managing risks associated with BYOD
Policy enforcement Challenges to productivity
Further Challenges
BYOD Strategies
Policy = Simplicity
Focusing on policy is the first step
Determine which devices are allowed to access the network
Determine which devices you will support
Separate Work From Fun
• Work life and personal life should be kept separate.
• To get network access, employees must agree to acceptable use policies.
• IT should monitor activity.
Make sure employees understand the rules and the risks.
BYOD is Here to Stay
• Will grow in size and scope• Presents new challenges and
opportunities• A BYOD strategy is critical for
data security
A major trend that is changing IT.
http://www.webopedia.com/TERM/V/VoIP.html http://www.cioupdate.com/technology-trends/b
yod-byoc-may-change-everything-about-security.html
http://www.infolawgroup.com/2012/03/articles/byod/the-security-privacy-and-legal-implications-of-byod-bring-your-own-device/
https://blogs.oracle.com/OracleIDM/entry/develop_and_enforce_a_bring
http://www.itproportal.com/2013/07/25/a-beginners-guide-to-byod-real-solutions-for-the-real-life-issues-facing-enterprises/#ixzz2fLwzkSKk
www.watchguard.com www.informationweek.com ww.w.zdnet.com www.cultofmac.com
References