Reference no: EM133049323
Many IT departments have difficulty keeping up with rapid changes in technology. Often employees would prefer to use their own devices to access corporate data. Personal laptops, home computers, and employee-owned smartphones have seen a dramatic increase as devices used to connect to business systems and data. Some employers see the cost and performance benefits of allowing this type of access and are firmly embracing a BYOD approach. Some smaller companies are even requiring employees to provide their own computing equipment. However, many companies are concerned about supporting these devices and are worried about the multitude of security issues that BYOD introduces.
Think about how the "work from anywhere" expectations of both employers and employees impact the adoption of BYOD. Consider the advantages that this strategy offers individuals and businesses, as well as what disadvantages would be introduced. If you reference any internal or external resource, remember to cite your sources appropriately.
1. What are the advantages that leveraging BYOD offers to a business?
2. What are the security risks that these devices pose to an organization?
3. Explain your approach to managing these devices in a secure way to prevent malware, avoid data leakage, and control access.
In response to two of your peers, build on each original poster's claims, and answer the following:
1. Do you think the benefits of BYOD outweigh the drawbacks?
2. How else could the poster mitigate BYOD risks?
|
Business globally
: Today's Global Economy is very top-down driven with the government making all the decisions and regulations as it relates to doing business globally.
|
|
Testing-inspection and inquiry
: There are generally three methods of usability evaluation: testing, inspection, and inquiry.
|
|
Quantitative and qualitative
: Compare and contrast two types of risks assessments: Quantitative and Qualitative
|
|
Personal interest applications
: Identify the uses of personal interest applications: lifestyle, medical, entertainment, convenience, and education
|
|
Benefits of byod outweigh the drawbacks
: What are the advantages that leveraging BYOD offers to a business? Do you think the benefits of BYOD outweigh the drawbacks?
|
|
Children internet protection act
: how the requirements of the Children's Internet Protection Act, Children's Online Privacy Protection Act and Family Educational Rights and Privacy Act
|
|
Resource planning and budget planning
: How would a cost management plan address the challenges of managing project costs within internal financial procedures and accounting codes of organization
|
|
Mainframe-based applications
: Consider two software applications that you regularly use that have menu interfaces, whether they are PC-or mainframe-based applications.
|
|
Network threats
: List three network threats and list the IT infrastructure domain that the threat may harm. Why/How does those threats harm that particular domain?
|