The presentation discusses about the policy of Bring your own Device. The scenario is that as a chief information security officer it is noticed that there is a large number of personal mobile devices that are used by the company on the wifi network of the company. When it is asked about the policy, it is seen that there are no such policies in the company. The presentation discusses about the Bring Your Own Device. The presentation focuses on the risks of BYOD and the mitigations of risk of BYOD and a marketing slide that can be used in order to be circulated in the office.
Bring your own device (BYOD)
Using personal devices in the office or work area
Connecting to the wifi of office with personal devices
It can upgrade the productivity and morale of employee
Risk of BYOD
The risk of bring your own devices include the following:
Vulnerability to malware
Mitigations of Risks
Audit of IT environment
Evaluation of specific devices
Set baseline security
Deploy acceptable use of policies and procedures
Educate the users
Investment in management of mobile devices
BYOD is important for any organization and it will help the employees to increase the productivity and convenience.
Increase the happiness among the employees
Boost the productivity of the employees.
Dawson, P., 2016. Five ways to hack and cheat with bring‐your‐own‐device electronic examinations. British Journal of Educational Technology, 47(4), pp.592-600.
Lee Jr, J., Warkentin, M., Crossler, R.E. and Otondo, R.F., 2017. Implications of monitoring mechanisms on bring your own device adoption. Journal of Computer Information Systems, 57(4), pp.309-318.
Steelman, Z.R., Lacity, M. and Sabherwal, R., 2016. Charting Your Organization’s Bring-Your-Own-Device Voyage. MIS Quarterly Executive, 15(2).
Dhingra, M., 2016. Legal issues in secure implementation of bring your own device (BYOD). Procedia Computer Science, 78, pp.179-184.