Byod Case Study Summary

Improved Essays
Also, besides the security concerns, another most significant factor is the IT support concerns. Many IT professional cannot manage all their employees’ devices. Also, they cannot control everything the employees doing while they are on the company’s network. It is crucial to weight both the positive and negative before deciding to adopt the BYOD. One critical point is the security policy. The BYOD policy should be implemented into a company’s IT policy. It should set a limit on how employees would use their companies’ IT infrastructures.
After a critical analysis of the advantages and disadvantages, my recommendations to the BYOD issues are the following:
I do not agree with the using of BYOD in a workforce. The risk that BYOD may cause
…show more content…
Lastly, the most significant part is an ex-employee threat. When an employee quits, she or he will leave the company with a massive amount of date that the company has no control of. Also, an ex-employee may intentionally or unintentionally leak his or her ex-employer data to the company’s competitor. Like we can tell, security plays a big issue when it comes to BYOD.
Even if a company has the best BYOD policy in place, I don’t think that it will help them. Companies should invest in their own electronic devices. Those electronic devices can be offered to the employees who work remotely. Any electronic devices that will be using in the company should belong to the company. Those devices should be monitored or tracked all the times and have all the security control in place. Employees should not be allowed to use their own devices to download their companies’ data or to do their companies’ works. Also, companies’ network should be secured using WPA2 security with AES encryption. This is the most secure option. Also, companies may use a network protocol analyzer which is a tool such as software or hardware used to capture and analyze signals and data traffics over a communication channel. One best tool that companies may use is Wireshark. It will help the network administrator to monitor every activity that is being performed on the company’s

Related Documents

  • Improved Essays

    5. Physical Security Devices a) Employee Identification Badges / Smart Cards: The company should provide employees with picture identification badges with a smart chip and magnetic strip. The company will provide unique public-key infrastructure (PKI) certificates on the employee’s smart chip, which will allow user access to the company network. Radio Frequency Identification (RFID) capable cards should not be used. While they are more convenient for access control than swipe cards, an attacker can scan and capture the identification information provided by the RFID chip without having to have any physical contact with the ID card, and use that information to gain access [43].…

    • 617 Words
    • 3 Pages
    Improved Essays
  • Superior Essays

    Nt1310 Unit 8.2

    • 772 Words
    • 4 Pages

    Many of these concerns may be remedied by simply revisiting the company policies and procedures. Data loss is a serious problem. Typically large companies have an automatic data backup in place. Proper automatic backups can be set up daily, weekly, or monthly. For this size company, I would recommend daily backups.…

    • 772 Words
    • 4 Pages
    Superior Essays
  • Improved Essays

    The business that I will use for my paper’s subject matter is a cabinet making company. Currently the company uses several business information systems. The corporation uses Peachtree accounting software, Microsoft Office for document publishing, an internally written MRP (material request planning), and Infinity QS systems for quality enhancement. All of these programs are currently running on the internal intranet but the systems do not communicate without cyborg intervention.…

    • 721 Words
    • 3 Pages
    Improved Essays
  • Improved Essays

    Here are some basic requirement to have a company network that can be fast and reliable I would like to have some time to talk to your IT manager to know where we are, and know the needs. Your IT manager might have most of this suggestion deployed already, in that case this can be used as a check list I will try to help as much as possible and I will be open to do any configuration of any device when you need me to ( I can do that from here) 1. The size of the company needs to be taken in consideration as well as the potential grown ( for space requirements)…

    • 485 Words
    • 2 Pages
    Improved Essays
  • Great Essays

    Nt1330 Unit 3 Assignment 1

    • 1044 Words
    • 5 Pages

    Additionally, when remote workers are employed by organizations it is important to provide the employee with a secure connection to the network and server. By using a VPN, the establishment of a safe connection can ensue. For example, when buying locks to keep homes or businesses safe there is a different key for every lock. This means like keys; the VPN establishes a secure connection that does not allow for intrusions to occur by using the Internet (Stewart 19). The remote connection is established by using a tunneling protocol which adds security by encrypting data.…

    • 1044 Words
    • 5 Pages
    Great Essays
  • Improved Essays

    The vulnerabilities identified in part 1 assignment was mitigated by recommending the right solutions. In part2, the network security analyst identified and proposed solutions for the right network devices to protect the accounting firm's network from intruders and external cyber threats. In this final assignment section, the network security analyst of the accounting firm will propose the application/end-user security recommendation to protect the company’s sensitive information. The analyst will also ensure that the proper procedure and policies are in place to take care of network security and employees should be trained and aware of those policies from possible threats including cyber-attacks.…

    • 730 Words
    • 3 Pages
    Improved Essays
  • Improved Essays

    TASK 3 Do some research and produce a word-processed report for the Managing Director of PVMS. Your report must explain how these improvements could be made and evaluate their impacts on PVMS and its staff. There are various ways Progress Vinyl Music Stores could improve the stores and head office, and centralise procedures for recording stock. For example, the employees are able to email their colleagues through web mail. Moreover, no email software’s require a computer just needs to be connected to the Internet and a browser.…

    • 542 Words
    • 3 Pages
    Improved Essays
  • Improved Essays

    Hrm/531 Week 2

    • 636 Words
    • 3 Pages

    Every business is required by law to have some form of security policy in place that will protect their customer’s information. How robust these policies are, may, and do, differ from company to company and can depend on many different factors unique to each individual business. Information security is very important and at my widget company it would be my responsibility and ethical duty to do everything in my power to find out how my system was breached and exactly what customers information was compromised as well as who is responsible for taking this information. I would also be ethically responsible for finding out which employees have not been adhering to the company's security policy and accessing customer information when it was not part of their duties, and under what circumstances this happened. Where these employees instructed to do this or did the do it of their own accord and if so reprimand these individuals up to and including termination of their employment with my company.…

    • 636 Words
    • 3 Pages
    Improved Essays
  • Improved Essays

    Johnson Financial (JF) is a mid-sized insurance company located in the northeast United States. The company supports a remote computing environment for users located outside of the corporate offices. The remote users, outside of the corporate network, support various aspects of the business operations. Up to twenty percent of the company users may remote compute at any point in time. The current method of remote computing is based on a company provided laptop and a vpn connection to the corporate data center.…

    • 501 Words
    • 3 Pages
    Improved Essays
  • Decent Essays

    Visiting websites that are dangerous. If any one of the employees are caught doing these things, not only it will hurt the person that is doing it, but the people around them. That means they will be fired. Accountability…

    • 428 Words
    • 2 Pages
    Decent Essays
  • Decent Essays

    The expectation of privacy has been found by courts to be a thin line when employees utilize an employer's equipment.…

    • 96 Words
    • 1 Pages
    Decent Essays
  • Improved Essays

    HIPAA Compliance Report

    • 463 Words
    • 2 Pages

    For this, the official needs to adhere to the Privacy and Security Rules and make sure that access to information is granted to various roles and designations, as deemed necessary. Furthermore, they will need to arrange for sessions, educating their workforce about the sensitivity of the data they will be handling, and the correct way of working with ePHI. Subsequently, the official will need to make sure that his department has enabled “Facility Access and Control” and “Workstation and Device Security” (Regola & Chawla, 2013). As a last step, the technical safeguards such as access control, audit controls, integrity controls, and transmission security need to be prepared. Best practices would entail the review and update of all policies and protocols on a regular…

    • 463 Words
    • 2 Pages
    Improved Essays
  • Superior Essays

    Vodaphone Case Study

    • 1623 Words
    • 7 Pages

    Vodafone Turkey was initially accepted in a positive manner throughout the country, with the hope that they would enhance service quality. However, due to a lack of investment in infrastructure or image, Vodaphone’s brand failed to resonate with the growing mobile market segment. Most critically, the company was labelled as aloof and out of touch with Turkish society. Further issues related to sales and distribution channels, which were weak, compounding a limited brand visibility.…

    • 1623 Words
    • 7 Pages
    Superior Essays
  • Great Essays

    Introduction In the modern world, the word “smart” is used everywhere from homes, to the schools, hospitals, market and businesses-to mention but just a few. Generally, people have come to love the word smart and want to be smart or even have smart items with them. Parents would want their children to be smart; people want to buy smart products like the Smartphone. The reality is that, you cannot avoid smart products in the modern world.…

    • 977 Words
    • 4 Pages
    Great Essays
  • Superior Essays

    Phones can be used for: teleconferences/Skype, email others, make calls, use company applications, and more. This technology eliminates the distractions of being in the office, while maintaining the benefits of collaboration (Hargittay 2014). This lack of workplace distractions, allows workers to be more productive with their time. They can accomplish tasks faster and therefore cost the company less human wage hours (Burg 2013). Employees can host conferences across the world, without leaving their homes, and they can still use the applications and other things they would use with their business.…

    • 1125 Words
    • 5 Pages
    Superior Essays