Your company is thinking of introducing a Bring Your Own Device (BYOD) policy. You have been tasked with assessing the risks associated with this implementation, including how to manage malware, data leakage, and access control.
Research threats and vulnerabilities by mobile and other devices introduced to networks through BYOD policies.
Discuss the following:
Let's first discuss the benifits of BYOD in company:
Employee Statisfaction
Increased productivity
Increased mobility
Lower Hardware cost to the company
After all the advantages the BYOD poses certain risks as well.
Those are:
Connecting to corporate wifi.
Accessing the shared resources on the network. These includes
printers, file systems.
Address device compatibility issue.
Risks include security and privacy issues:
Lets discuss those
Security Issue: These involve data loss, data leakage, Insecure usage of network, Infected or malicious apps, public exposure.
Privacy Issue: These involve personal data loss which happens when the device is open to the network or can be hacked to access personal data. Litigation.
How to address these issues?
Managing BYOD in the enterprise entails some cost of buying third
party application to support Security. These applications
include:
Enterprise Mobility Management (EMM)
Mobile Application Management (MAM)
Mobile Device Management (MDM)
BYOD 1
BYOD 2
Virtual Hosted Desktop (VHD) Containerization
Next Gen Network Access Control (NAC)
Below are certain points to focus to ensure security:
Remote Wipe: Remote wipe is the facility to remotely delete data
from a device.
Risk profiling.
Device tracing.
Isolating data.
Get Answers For Free
Most questions answered within 1 hours.