BYOD
describes a growing trend where employees are allowed to bring personally owned
mobile devices to their place of work, and use them to access privileged
company resources such as email, file servers and databases, as well as their
own personal applications and data
Understanding
cloud based services can help IT managers and Service Providers answer the key
question they face concerning BYOD: how do we facilitate more flexible,
efficient IT services, without compromising on security or usability?
Opportunities
Morale/Productivity
Under BYOD,
employees choose which technology or device they wish to use for work, rather
than having it dictated to them as part of company policy. This can improve
morale and productivity by empowering staff to work according to their own
preferences – including the ability to choose applications which might not
necessarily be made available by their enterprise.
Reduced
Data Leakage
Employees
can minimize the risk of inadvertent data loss by protecting their devices using
a device-locking password. Companies should also have policies in place that
enable the remote wiping of a device, should it be mislaid.
Data is
encrypted
BYOD can be
secure. The use of a secure wireless protocol for all Network access – most
commonly WPA2-Enterprise which is the only wireless protection standard that
provides all three primary forms of wireless security – should be standard
procedure.
Risks
Data Breach
The risk of
data breaches on personal devices is every bit as real as on company issued
devices. If an employee uses a Smartphone to access the company network and
then loses that phone, the confidential data stored on the phone could
potentially be retrieved by untrusted parties.
Control
& Access
Controlling
how Bring Your Own Devices access Private or Corporate Networks, and how to
ensure this is enabled securely, is another added layer of complexity that
needs to be carefully thought through.
Compliance
Businesses
that need to ensure compliance such as PCI or HIPAA may find defining and
enforcing an acceptable use policy under BYOD difficult for devices which are
not owned and (completely) managed by the company.
Think about
the services and applications that you want to provide on BYOD devices and
whether they differ by working groups, user types, types of devices and
networks used, as defined by your policy.
Rinse the
cost sharing
Some
organizations provide a subsidy for BYOD devices and other services, especially
in cases where no longer given a corporate device. When considering a stipend,
you should consider the tax consequences and potential IT cost savings.
This site
provides wide information about these trending topics like byod, byod security,
byod policy. Stay with the latest trend of byod. Let us know your valuable opinion
through commenting and sending us mail.
Please
contact us at:
Byod
Security
Holding # 536, Word # 9, Jear kacher, 1 No Shari Shadi Union,
Feni Sadar, Feni. 3900, Bangladesh.
+8801819625182
E-mail:
jahedulislam@yahoo.com
Skype:
jahedulislam