Bring Your Own Device (BYOD): The mobile computing challenge
()
About this ebook
Related to Bring Your Own Device (BYOD)
Related ebooks
Data Privacy: What Enterprises Need to Know? Rating: 0 out of 5 stars0 ratingsMobile Computing: Securing your workforce Rating: 0 out of 5 stars0 ratingsGDPR for DevOp(Sec) - The laws, Controls and solutions Rating: 5 out of 5 stars5/5Privacy Impact Assessment A Complete Guide - 2019 Edition Rating: 0 out of 5 stars0 ratingsIdentity and Access Management IAM Complete Self-Assessment Guide Rating: 4 out of 5 stars4/5IT GRC A Complete Guide - 2020 Edition Rating: 0 out of 5 stars0 ratingsIdentity Governance And Administration A Complete Guide - 2020 Edition Rating: 0 out of 5 stars0 ratingsISO 19770 A Complete Guide - 2021 Edition Rating: 0 out of 5 stars0 ratingsManaging Information Security Breaches: Studies from real life Rating: 0 out of 5 stars0 ratingsCombat Ready IT and PIE: Cyber Security for Small Medium Business and Perpetual Improvement Everywhe Rating: 5 out of 5 stars5/5Service Level Agreements A Complete Guide - 2020 Edition Rating: 0 out of 5 stars0 ratingsNetwork Infrastructure A Complete Guide - 2019 Edition Rating: 5 out of 5 stars5/5Data Technologies A Complete Guide - 2020 Edition Rating: 0 out of 5 stars0 ratingsIT Demand Management A Complete Guide - 2021 Edition Rating: 0 out of 5 stars0 ratingsIdentity and Access Management IAM A Complete Guide - 2019 Edition Rating: 0 out of 5 stars0 ratingsApplication Security in the ISO27001 Environment Rating: 0 out of 5 stars0 ratingsUpcoming Updates In Data Protection: Whistleblowing Channels Rating: 0 out of 5 stars0 ratingsGetting a Job in IT the Smart Way Rating: 0 out of 5 stars0 ratingsBring Your Own Device (BYOD) to Work: Trend Report Rating: 0 out of 5 stars0 ratingsA concise introduction to the NIS Directive: A pocket guide for digital service providers Rating: 0 out of 5 stars0 ratingsBusiness Continuity Policies A Complete Guide Rating: 0 out of 5 stars0 ratingsSecurity And Privacy Governance A Complete Guide - 2021 Edition Rating: 0 out of 5 stars0 ratingsThe True Cost of Information Security Breaches and Cyber Crime Rating: 0 out of 5 stars0 ratingsProject Plan Document Third Edition Rating: 0 out of 5 stars0 ratingsSaaS Subscription Complete Self-Assessment Guide Rating: 0 out of 5 stars0 ratingsPrivacy And Cybersecurity A Complete Guide - 2019 Edition Rating: 0 out of 5 stars0 ratingsThirdParty Cybersecurity Risk Management A Complete Guide - 2019 Edition Rating: 0 out of 5 stars0 ratingsEnterprise Mobile Device Management Complete Self-Assessment Guide Rating: 0 out of 5 stars0 ratingsInformation Security Breaches: Avoidance and Treatment based on ISO27001 Rating: 0 out of 5 stars0 ratingsCybersecurity Maturity Model Certification A Complete Guide - 2021 Edition Rating: 0 out of 5 stars0 ratings
Information Technology For You
Computer Science: A Concise Introduction Rating: 4 out of 5 stars4/5How to Write Effective Emails at Work Rating: 4 out of 5 stars4/5Inkscape Beginner’s Guide Rating: 5 out of 5 stars5/5Creating Online Courses with ChatGPT | A Step-by-Step Guide with Prompt Templates Rating: 4 out of 5 stars4/5Health Informatics: Practical Guide Rating: 0 out of 5 stars0 ratingsHow To Use Chatgpt: Using Chatgpt To Make Money Online Has Never Been This Simple Rating: 0 out of 5 stars0 ratingsData Governance For Dummies Rating: 0 out of 5 stars0 ratingsData Analytics for Beginners: Introduction to Data Analytics Rating: 4 out of 5 stars4/5ChatGPT: The Future of Intelligent Conversation Rating: 4 out of 5 stars4/5AWS Certified Cloud Practitioner: Study Guide with Practice Questions and Labs Rating: 5 out of 5 stars5/5Linux Command Line and Shell Scripting Bible Rating: 3 out of 5 stars3/5Micro Niches Rating: 0 out of 5 stars0 ratingsCODING INTERVIEW: Advanced Methods to Learn and Excel in Coding Interview Rating: 0 out of 5 stars0 ratingsAn Ultimate Guide to Kali Linux for Beginners Rating: 3 out of 5 stars3/5CompTIA ITF+ CertMike: Prepare. Practice. Pass the Test! Get Certified!: Exam FC0-U61 Rating: 0 out of 5 stars0 ratingsComputer Organization and Design: The Hardware / Software Interface Rating: 4 out of 5 stars4/5Hacking Essentials - The Beginner's Guide To Ethical Hacking And Penetration Testing Rating: 3 out of 5 stars3/5Windows Registry Forensics: Advanced Digital Forensic Analysis of the Windows Registry Rating: 4 out of 5 stars4/5Cybersecurity for Beginners : Learn the Fundamentals of Cybersecurity in an Easy, Step-by-Step Guide: 1 Rating: 0 out of 5 stars0 ratingsProgramming for Everyone Rating: 3 out of 5 stars3/5Raspberry Pi :Raspberry Pi Guide On Python & Projects Programming In Easy Steps Rating: 3 out of 5 stars3/5CompTIA A+ CertMike: Prepare. Practice. Pass the Test! Get Certified!: Core 1 Exam 220-1101 Rating: 0 out of 5 stars0 ratingsHandbook of Digital Forensics and Investigation Rating: 4 out of 5 stars4/5Guide to Healthcare Information Protection and Privacy for Executives Rating: 0 out of 5 stars0 ratingsSupercommunicator: Explaining the Complicated So Anyone Can Understand Rating: 3 out of 5 stars3/5COMPUTER SCIENCE FOR ROOKIES Rating: 0 out of 5 stars0 ratingsThe Basics of Hacking and Penetration Testing: Ethical Hacking and Penetration Testing Made Easy Rating: 4 out of 5 stars4/5
Reviews for Bring Your Own Device (BYOD)
0 ratings0 reviews
Book preview
Bring Your Own Device (BYOD) - BCS, The Chartered Institute for IT
1 BYOD: THE PROS AND CONS FOR END USERS AND THE BUSINESS
Without a doubt, ‘bring your own device’ (BYOD) has become one of the industry hot topics. IT professionals are wary of it, end users are embracing it and vendors are trying to market it. It’s a subject that’s dividing opinion, with the security implications alone causing IT managers to wake up in a cold sweat. Alex Wood, Marketing Manager at Point to Point, reports on this growing trend.
There is one very obvious and visible benefit of the ‘bring your own device’ phenomenon – productivity increases. Quite simply, users work better and increase productivity while feeling more content with the freedom to use their own devices.
Also, with a greater degree of personal ownership and personal finance involved, employees take the time to maintain their beloved gadgets. From a corporate perspective, there’s the clear cost savings attributed to decreased hardware replacements.
However, the most positive aspect of BYOD is entirely intangible. Fundamentally, BYOD allows employees to interact directly with IT in a positive sense. It reflects a proactive approach from IT departments, working with the end user rather than against them.
Employees want to use the most appropriate device to help them do their job. You’re the marketing manager? OK, use a Macbook. Work in sales? Make the most of your tablet for taking notes in meetings.
When you think about the negatives surrounding BYOD, the issue of security is never far away. Data leakage and the risk of malware are the obvious problem areas that spring to mind. Additionally, although very few people will deliberately steal corporate data, there’s always the risk of leaving a tablet, laptop, phone and so on in the back of a taxi. Importantly there is some great mobile device management software around that seriously mitigates the risk of data theft.
One might think this issue is as simple as deciding whether to allow BYOD or not, but unfortunately it’s not as straightforward as that. Organisations need to decide whether to embrace fully the BYOD ethos or restrict it ever so slightly. For example, are you going to allow Android devices or just Apple? Some organisations suggest that Android’s open format makes it more susceptible to attacks, thus rendering the Google-owned platform out of bounds.
Equally, where do organisations draw the line around the management and maintenance of personally owned devices? Parameters need to be clearly defined. If a device breaks, does IT fix it or is it a case of ‘taking it to PC World’?
Similarly, if people have their own devices, there seems to be an increased impetus to work outside traditional hours. As a result of this, employees expect 24/7 support when they can’t log in on a Sunday afternoon. In addition, there is reluctance from some employees around mixing ‘business and pleasure’. Whilst the majority of workers seem enthusiastic to embrace BYOD, it must be noted that some individuals are happy just to log on to their work device at 9.00 am and to log off at 5.30 pm.
In this case, it’s crucial for organisations to consider who should be included in any BYOD pilot. You wouldn’t necessarily want task workers in a call centre working off iPads, but you may want your presales team to have that degree of flexibility.
One thing becomes increasingly clear when you ponder the implications of BYOD. Having some type of strategy, even if it’s relatively vague, is essential. Otherwise you’re going to start running into all sorts of issues. Slightly worryingly, recent research is suggesting that two thirds of organisations don’t have any BYOD strategy in place. Guidelines and expectations need to be set, as well as a degree of accountability.
To achieve this, it’s safe to say that BYOD and mobile device management (MDM) software need to go hand in hand. MDM needs to be more than a desirable add-on; it should be a prerequisite. Any sane IT professional should have some serious reservations about a company even considering BYOD without any type of MDM security tool.
When working with clients, vendors and resellers need to help manage expectations and formulate a realistic strategy. From the customer’s perspective, it’s crucial to understand whether BYOD is achievable, necessary and scalable.
There are risks around BYOD and IT organisations need to help customers weigh up the pros and cons. BYOD is a change in mentality: not just from the user’s perspective, but also to any organisation’s IT hierarchy.
Add your comments at www.bcs.org/content/conWebDoc/47519
2 TECHNOLOGY INNOVATIONS FOR TODAY’S WORKSPACE
Jim Henrys, Principal Strategist at Intel, discusses the implications of the consumerisation of IT on business users and the IT department.
We have seen a fundamental shift in the way in which technology innovations become part of our business lives. Only few years ago, new hardware and software would be first adopted in the enterprise and