logo

BYOD Challenges for IT Network

   

Added on  2019-09-16

5 Pages847 Words602 Views
 | 
 | 
 | 
VODAFONEVodafone BYOTABC[Pick the date]
BYOD Challenges for IT Network_1

1Bring-your-own-device (BYOD) policy for the employees in an organisation which states tobring your devices own personal devices such as personal computer (BYOPC) or your owntechnology (BYOT) or personal phone (BYOC) to office, allowing employees freely using itsown personal gadgets & integrating it with the office IT services (Bamber, 2010). It alsoincludes permission to use personally owned devices such as laptops, tablets, andsmartphones in the office space. New terminology is coined for this IT consumerization. For the successful implementation following factors can be kept in minds:Specify What Devices Are Permitted-: Gadgets such as iPad’s, iPhone’s blackberry devicesetc. should be approved & clear by signing a contract in between the employees & office.Make It Clear Who Owns What Apps and Data-: Some of the data or apps loaded may resultin the additional welcoming of malicious or virus contents & may result in unwarrantedbreaches. Hence specifically who owns which data should be clearly defined.Establish a Stringent Security Policy for all Devices-: IT Security needs to adhere at everystages & obediently following rules & procedures should be followed strictly.Challenges of BYOD to IT network Allowing employees to use personal gadgets & allowing it get it integrated with the office ITservices there can be important risks such as using the office related business informationwhich can result in stealing of business information & selling it to the competitor's group(Steinherr, 2000).
BYOD Challenges for IT Network_2

End of preview

Want to access all the pages? Upload your documents or become a member.

Related Documents
Vodafone BYOD Policy Implementation
|5
|628
|79

Policy of Bring Your Own Device - Vodafone
|4
|914
|70

BYOD Policy Design for Southern Cross University
|8
|1829
|264

Why is cybersecurity important for the education sector?
|14
|3669
|11

BYOD Policy Threats and Security Strategies for Cybersecurity
|11
|2820
|426

THE INFORMATION SECURITY
|5
|620
|20