Do you think the benefits of BYOD outweigh the drawbacks
Do you think the benefits of BYOD outweigh the drawbacks?
How else could the poster mitigate BYOD risks?
PEER 1!!!!
What are the advantages that leveraging BYOD offers to a business?
One of the advantages of leveraging BYOD to a business is cost savings. It will be the individual that will be using their personal devices and the company doesn’t need to worry anything about repair or maintenance. The IT supports can focus on other things instead of taking care of the device that is personally owned by an employee.
What are the security risks that these devices pose to an organization?
The security risks that these devices pose to an organization is the security issues. Since the company is not the one managing the device, there might be some instances where the password that they are using is not up to the security policies.
- Explain your approach to managing these devices in a secure way to prevent malware, avoid data leakage, and control access.
One way to avoid these security risks is to have an application that will need to be installed in each devices. This is the same method that I am using at work. The app gets updated and gives certification to the device. Once the certification is there, the VPN can now be installed so that device can get into the CORP network. By doing this approach, it prevents any data leakage or control access.PEER 2!!!!:
I hope everyone is having a great day. The distinct advantage for a business to leverage BYOD, is the capital expense that is required to purchase and maintain each piece of new technology can be invested in other areas of the business. These cost savings could allow a start-up business to survive until the revenue streams from sales begins to turn profitable. The most important factor is the security loophole it could potentially open up for a business to allow BYOD because there exist many unknowns about an employee’s device like OS updates installed, applications installed and the potential of allowing malware into the network by a BYOD, are all factors that need to be thoroughly understood before a policy is adopted for the use of BYOD at work.
The establishment of a management plan for BYOD and the adoption of a Acceptable Use Policy (AUP) by the organization would a first step to help create the guidelines necessary to ensure future success of using this type of device sharing program. The AUP would define the implementation of Network Access Control (NAC) which would install anti-malware software and conduct a scan before the device would be granted access on the network. The creation of a guest wireless network away from the primary network that would allow BYOD devices internet access but not to sensitive areas of the network. The last item is to establish a policy and procedures to protect data like device encryption, authentication to log back into the system if device is left dormant too long and immediately reporting lost or stolen devices. These are just a few ways to manage these types of devices that present both a powerful resource for a business to utilize and a potential for tremendous financial liability if data security was compromised by malicious entities. Have a great day everyone. King Chang
PEER 2!!!!:
I hope everyone is having a great day. The distinct advantage for a business to leverage BYOD, is the capital expense that is required to purchase and maintain each piece of new technology can be invested in other areas of the business. These cost savings could allow a start-up business to survive until the revenue streams from sales begins to turn profitable. The most important factor is the security loophole it could potentially open up for a business to allow BYOD because there exist many unknowns about an employee’s device like OS updates installed, applications installed and the potential of allowing malware into the network by a BYOD, are all factors that need to be thoroughly understood before a policy is adopted for the use of BYOD at work.
The establishment of a management plan for BYOD and the adoption of a Acceptable Use Policy (AUP) by the organization would a first step to help create the guidelines necessary to ensure future success of using this type of device sharing program. The AUP would define the implementation of Network Access Control (NAC) which would install anti-malware software and conduct a scan before the device would be granted access on the network. The creation of a guest wireless network away from the primary network that would allow BYOD devices internet access but not to sensitive areas of the network. The last item is to establish a policy and procedures to protect data like device encryption, authentication to log back into the system if device is left dormant too long and immediately reporting lost or stolen devices. These are just a few ways to manage these types of devices that present both a powerful resource for a business to utilize and a potential for tremendous financial liability if data security was compromised by malicious entities. Have a great day everyone. King Chang
Answer preview to do you think the benefits of BYOD outweigh the drawbacks
APA
277 words
Get instant access to the full solution from yourhomeworksolutions by clicking the purchase button below