• Get Now

Featured Posts

Bring Your Own Device (BYOD) On Cyber Security

February 7, 2019 | By admin 
 1 Star2 Stars3 Stars4 Stars5 Stars (8 votes, 5.00 / 5
Loading...

Bring Your Own Device

Organizations have been implementing BYOD system – which gives the employees the leverage to bring their own computing devices like PCs, smartphones and even laptops to stay connected with the corporate-owned network. With BYOD they can work from anywhere, and anytime. This benefits the users as they get the leverage to work with the latest mobile gadget and the operating system that they are more comfortable with.

The use of BYOD in any organization would certainly elevate the level of productivity and confidence of the employee. However, BYOD not just comes with a range of benefits but also comes with a list of following disadvantages
• Creates opportunities of losing data
• Overlapping of personal data with corporate data
• Unknowing Installation of Malware Apps by the user
• Creates a necessity to expand IT infrastructure

Bring your own device pros and cons

BYOD Pros
• BYOD benefits the organizations with the latest features from the user-owned new devices. Users stay updated with technology with their personal devices – this is an added benefit for the organization as they benefit out of the latest updates with zero cost investment on the technology.
• Satisfied and contended Employees as they are much familiar with their own device and they find it convenient to work from anywhere and anytime.
• There is a huge financial gain by implementing BYOD policies it reduces the costs of technology for companies, while the employees are accountable for the device costs, service fees and the other associated costs and services.
BYOD policies enhance the productivity of the user and ensures the work is done faster as the users know better about their own device.

BYOD Cons
BYOD devices pose a lot of security problems. Therefore organizations require the devices of the employees to be compliant to a specific set of security policies and be monitored and managed to check if they are following a specific set of security rules. This can interfere with the privacy of the personal data of the users’ device.
Not all users have the same quality of devices. Some use the latest android or iPhone version while some use the outdated Android or iPhone version. BYOD users with varied OSes work for a same project, it becomes challenging to support all the different operating systems.
BYOD policies allow employers to access all the personal information. Therefore it is critical for all the organizations to plan or protect the employees’ personal data

Bring your own device security issues

Security Issues
Loss of Data – When the device is lost, data loss and data theft can be possible – therefore there is certainly a compromise of data.
Local exposure – Processing and storing of enterprise data in a personal device would lose control over the sensitive data involved.
Data disclosure – When enterprise is stored in unsecured device, there are possibilities of data leakage.
Vulnerable Exploit – It is definitely vulnerable to man-in-the-middle attacks when users connect their devices to public wifi hotspots.
Malicious apps – When users install malware apps from third-party app store, the users’ devices become vulnerable to malware attacks. The malware apps are capable to alter, and extract information from the users’ devices.

Conclusion

Implementation of BYOD technology overlaps the professional and personal life and it has given no room to privacy of personal data. This demands organizations to strictly enforce BYOD policies and guidelines with which the corporate users must comply to prevent BYOD related security issues and challenges.

BYOD Policy

Be part of an IT community with thousands of subscribers. Get the latest news, blogs, and thought leadership articles. Subscribe now
Email *
Be Sociable, Share!
  • Pin icon
  • More Icon

Add new comment

Your name
Comment

You may use these HTML tags and attributes: <abbr title=""> <acronym title=""> <b> <blockquote cite=""> <cite> <code> <del datetime=""> <em> <i> <q cite=""> <strike> <strong>