Monday, May 11, 2020

Benefits And Risk Factors Regarding Bring Your Own Devices

This paper looks through benefits and risk factors regarding bring your own devices (BYOD). BYOD is a new practice that is becoming common to many organizations. This paper shows us that BYOD is an inevitable part of modern business practice and also this paper shows BYOD adoption continue to rise due to the effectiveness achieved in supporting the business operation. This paper also discusses the risks in BYOD that can be harmful to organization. The paper also gives us the information of how the risks of BYOD can be solved taking some parameters into account. INTRODUCTION BYOD is a strategy that gives privilege to employees and business partners to use a personally selected device to achieve company’s task and access their data. The†¦show more content†¦The University of Wollongong Library and Google Scholar search engines were utilized to search about the topic based on key words: BYOD, ‘bring your own device,’ mobile device, personal device, risk factor using BYOD. Many articles related to the topic of risk management and benefits of BYOD were beneficiary for getting knowledge. FINDINGS 1. Loss of data using BYOD techniques 2. Lack of control over data and devices using BYOD techniques 3. Vulnerabilities due to installation of malicious using BYOD techniques Loss of data using BYOD techniques One of the most daunting risks with BYOD is loss of data due to personal devices being lost or stolen in or outside the work place and this occurs due to ease and convenience offered by the size of the smart devices which make them easily drop or misplace. With the increase in purchase of smart phones and tablets daily, these devices are being targeted by thieves due to their high cost price and size. Once the theft is done there is a high possibility to loose data that is important even though there are technologies to backup them. Additionally there are cases of losing data when employees upgrade, change or sell their phones and in this case there is a possibility of confidential and sensitive data being passed to unauthorized

No comments:

Post a Comment

Note: Only a member of this blog may post a comment.