Analyzing IT Risks in Aztek Corporation's BYOD Project
VerifiedAdded on  2020/04/07
|20
|5312
|490
Report
AI Summary
This report provides an executive summary, introduction, and analysis of the Bring Your Own Device (BYOD) project proposed for Aztek Corporation, an Australian financial services company. The report examines the IT risks associated with allowing employees to use their own devices (laptops, tablets, and mobile phones) in the workplace, focusing on data security, government regulations, and current security practices. It assesses risks, including third-party access, data tracking, management, and leakage, offering recommendations to mitigate these threats. The report reviews relevant government regulations, industry practices, and the impact of application trends. The project's potential benefits, such as cost savings, are weighed against the security challenges. Ultimately, the report emphasizes the importance of data security and provides recommendations for ensuring confidential business information, adhering to BYOD policies, and addressing data leakage risks. The report concludes by recommending the project's adoption while mitigating associated IT risks.

Running head: BRING YOUR OWN DEVICE (BYOD) PROJECT
Bring Your Own Device (BYOD) Project
Name:
Affiliation:
Date:
Bring Your Own Device (BYOD) Project
Name:
Affiliation:
Date:
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser

BRING YOUR OWN DEVICE (BYOD) PROJECT 2
Executive summary
Aztek Corporation is an Australian company operating in financial services sector. Currently, the
firm is facing competition due to many organization venturing in that sector. To ensure that the
business competes favorably in the market and compete effectively, various projects have been
proposed. Amongst the projects is the one aiming at allowing employees to bring their own
devices such as laptops, tablets and mobile phones in the workplace. The introduction of the
project intends to make the employee's devices the only or the primary tools in achieving their
tasks. The implementation of the project will enable the company makes some savings since the
funds incurred in acquiring such assets will decline significantly. The saved financial resources
will be directed to other sectors and most probably strengthen the areas of weaknesses. However,
the project seems to be associated with many information technology (IT) risks.
This report is therefore concerned in analyzing the information technology risks associated with
employees bring their own devices to their workplace and using them as their primary or sole
tools in performing their tasks. The methods to be discussed in this report will include mobile
phones, tablets, and laptops. Aztek Corporation Company which is amongst the prominent
business players in the Australian financial services sector will be the case study throughout the
report. The paper will analyze the IT risks critically, evaluate and measure them accordingly.
In the discussion of information technology risks, various sectors will be checked including the
existing and current information technology practices applied in the organization. The
knowledge of current technological practices in the organization will help in determining the
appraisal of the technology in the firm. The practices of the government to the organizations
venturing in the Australian Financial Service Sector will be discussed briefly.
Executive summary
Aztek Corporation is an Australian company operating in financial services sector. Currently, the
firm is facing competition due to many organization venturing in that sector. To ensure that the
business competes favorably in the market and compete effectively, various projects have been
proposed. Amongst the projects is the one aiming at allowing employees to bring their own
devices such as laptops, tablets and mobile phones in the workplace. The introduction of the
project intends to make the employee's devices the only or the primary tools in achieving their
tasks. The implementation of the project will enable the company makes some savings since the
funds incurred in acquiring such assets will decline significantly. The saved financial resources
will be directed to other sectors and most probably strengthen the areas of weaknesses. However,
the project seems to be associated with many information technology (IT) risks.
This report is therefore concerned in analyzing the information technology risks associated with
employees bring their own devices to their workplace and using them as their primary or sole
tools in performing their tasks. The methods to be discussed in this report will include mobile
phones, tablets, and laptops. Aztek Corporation Company which is amongst the prominent
business players in the Australian financial services sector will be the case study throughout the
report. The paper will analyze the IT risks critically, evaluate and measure them accordingly.
In the discussion of information technology risks, various sectors will be checked including the
existing and current information technology practices applied in the organization. The
knowledge of current technological practices in the organization will help in determining the
appraisal of the technology in the firm. The practices of the government to the organizations
venturing in the Australian Financial Service Sector will be discussed briefly.

BRING YOUR OWN DEVICE (BYOD) PROJECT 3
A review of the organizations which have initially allowed employees to bring their devices at
working places will be looked at to give a clear picture of areas which should be emphasized.
The benefits and shortcomings facing those organizations will be reviewed. The impacts of
application trends in the IT landscape will be discussed. The implementation of the project is
expected to have both negative and positive effects. The paper also discusses in details the
benefits of the adoption of the systems and disadvantages to the organization. The issues of
security are well captured since the project is associated with a lot of insecurity issues.
The risk assessment is also highlighted, and it addresses various issues including threats,
vulnerabilities, and consequences resulting from implementation of the project in Aztek
Corporation. The report is highly concerned on recommending the methods of safeguarding the
organization from data insecurity. Mechanisms of ensuring confidential business information by
adhering to the BYOD (Bring Your Device) programs and policies and therefore applying the
same in employment agreement terms. The support given to the BYOD program will determine
whether the project will run expectedly in Aztek Corporation. The information technology risks
associated with the project will be discussed accordingly.
Lastly, the report tackles the issue of data security to the Aztek Corporation. When employees
are allowed to bring their own devices to the workplace and apply them to perform their duties, it
is likely the data of the organization will be leaked. Leaking business information is a significant
threat to the team since it may be used by competitors to identify the firm's strengths and existing
opportunities. The issues of data security should be addressed accordingly before the business
adopt the project fully. The advantages outnumber the challenges bringing a reason as to why the
firm should adopt the project. The relevant recommendations for mitigating the information
technology risks associated with the implementation of the projects are stated.
A review of the organizations which have initially allowed employees to bring their devices at
working places will be looked at to give a clear picture of areas which should be emphasized.
The benefits and shortcomings facing those organizations will be reviewed. The impacts of
application trends in the IT landscape will be discussed. The implementation of the project is
expected to have both negative and positive effects. The paper also discusses in details the
benefits of the adoption of the systems and disadvantages to the organization. The issues of
security are well captured since the project is associated with a lot of insecurity issues.
The risk assessment is also highlighted, and it addresses various issues including threats,
vulnerabilities, and consequences resulting from implementation of the project in Aztek
Corporation. The report is highly concerned on recommending the methods of safeguarding the
organization from data insecurity. Mechanisms of ensuring confidential business information by
adhering to the BYOD (Bring Your Device) programs and policies and therefore applying the
same in employment agreement terms. The support given to the BYOD program will determine
whether the project will run expectedly in Aztek Corporation. The information technology risks
associated with the project will be discussed accordingly.
Lastly, the report tackles the issue of data security to the Aztek Corporation. When employees
are allowed to bring their own devices to the workplace and apply them to perform their duties, it
is likely the data of the organization will be leaked. Leaking business information is a significant
threat to the team since it may be used by competitors to identify the firm's strengths and existing
opportunities. The issues of data security should be addressed accordingly before the business
adopt the project fully. The advantages outnumber the challenges bringing a reason as to why the
firm should adopt the project. The relevant recommendations for mitigating the information
technology risks associated with the implementation of the projects are stated.
⊘ This is a preview!⊘
Do you want full access?
Subscribe today to unlock all pages.

Trusted by 1+ million students worldwide

BRING YOUR OWN DEVICE (BYOD) PROJECT 4
Table of Contents
Executive summary.....................................................................................................................................2
Introduction.................................................................................................................................................5
The review of the project concerning Financial Services sector..................................................................6
Relevant government regulation..............................................................................................................6
Financial services sector review..............................................................................................................8
Current Security Aztek Posture...............................................................................................................9
The concept of BYOD (Bring Your Own Device).................................................................................11
IT Platform factors impacting BYOD Concept......................................................................................11
Risk Assessment........................................................................................................................................12
The risk of managing unknown third-party access and mobile applications..........................................12
The risk of probable challenges in data tracking....................................................................................13
The risk of probable difficulty in data management and segregation of compliance.............................14
The risk of data leakage due to loss of personal gadgets.......................................................................14
Data security..............................................................................................................................................15
Recommendations.....................................................................................................................................16
Conclusion.................................................................................................................................................16
References.................................................................................................................................................17
Table of Contents
Executive summary.....................................................................................................................................2
Introduction.................................................................................................................................................5
The review of the project concerning Financial Services sector..................................................................6
Relevant government regulation..............................................................................................................6
Financial services sector review..............................................................................................................8
Current Security Aztek Posture...............................................................................................................9
The concept of BYOD (Bring Your Own Device).................................................................................11
IT Platform factors impacting BYOD Concept......................................................................................11
Risk Assessment........................................................................................................................................12
The risk of managing unknown third-party access and mobile applications..........................................12
The risk of probable challenges in data tracking....................................................................................13
The risk of probable difficulty in data management and segregation of compliance.............................14
The risk of data leakage due to loss of personal gadgets.......................................................................14
Data security..............................................................................................................................................15
Recommendations.....................................................................................................................................16
Conclusion.................................................................................................................................................16
References.................................................................................................................................................17
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser

BRING YOUR OWN DEVICE (BYOD) PROJECT 5
Introduction
The continuous advancement in technology has increased its widened use in the business sector.
It is because most of the business operation and transactions are based on a technology platform.
It is becoming mandatory that every business is adopting the modern technology in its
operations. The financial sector has been widely affected, and firms operating in that area have
embraced the use of informatics. Advancement of information and communication technology
has made the operations of organizations easy and fast.
Due to competition, anxiety, and zeal of organizations to achieve their goals new projects are
being proposed and implemented every day after an adequate research. Aztek Corporation group
is a company operating in the financial services sector in Australia. The organization is amongst
the leading companies in the financial services industry. However, the company is facing a lot of
competition. To outdo the competitors, the company has opted to implement a project of
allowing the employees use their own devices at working place. The project is chosen to bring
some savings to the organization since it will save on cost. The project is associated with several
information technology risks.
This report, therefore, introduces the project of allowing employees use their own devices in the
workplace. Amongst the discussed devices will be mobile phones, tablets, and laptops. All areas
affecting the project will be considered accordingly showing the business the trend it should
adopt to enjoy unlimited benefits. A review of the project will be done respectively in the
financial sector service. The relevant government, industry regulation, compliance and all
established best practices will be highlighted. The project will be reviewed based on the current
security posture of Aztek Company. It will be expressed by the present maturity against
information technology security policies and procedure. The risk assessment of threats,
Introduction
The continuous advancement in technology has increased its widened use in the business sector.
It is because most of the business operation and transactions are based on a technology platform.
It is becoming mandatory that every business is adopting the modern technology in its
operations. The financial sector has been widely affected, and firms operating in that area have
embraced the use of informatics. Advancement of information and communication technology
has made the operations of organizations easy and fast.
Due to competition, anxiety, and zeal of organizations to achieve their goals new projects are
being proposed and implemented every day after an adequate research. Aztek Corporation group
is a company operating in the financial services sector in Australia. The organization is amongst
the leading companies in the financial services industry. However, the company is facing a lot of
competition. To outdo the competitors, the company has opted to implement a project of
allowing the employees use their own devices at working place. The project is chosen to bring
some savings to the organization since it will save on cost. The project is associated with several
information technology risks.
This report, therefore, introduces the project of allowing employees use their own devices in the
workplace. Amongst the discussed devices will be mobile phones, tablets, and laptops. All areas
affecting the project will be considered accordingly showing the business the trend it should
adopt to enjoy unlimited benefits. A review of the project will be done respectively in the
financial sector service. The relevant government, industry regulation, compliance and all
established best practices will be highlighted. The project will be reviewed based on the current
security posture of Aztek Company. It will be expressed by the present maturity against
information technology security policies and procedure. The risk assessment of threats,

BRING YOUR OWN DEVICE (BYOD) PROJECT 6
consequences, and vulnerabilities adopted form computer control framework are also reviewed.
The existing industry risk recommendations for the project are addressed.
Data security is also discussed while insisting on the goals of Aztek Corporation. Data security is
very crucial to the project since we are all aware of the threat which can be met when employees
are allowed to bring their own devices to the workplace and execute their duties using the
devices. It is because data security is concerned with the flow of the data and the individual who
will have access to the data. All the aspects concerning the projects are discussed to ensure that it
runs efficiently and keeps Aztek Corporation operating amongst the top companies in Australian
Financial sector and possibly place the company at the top place. The project aims at ensuring
that the Aztek Corporation improves in its areas of weaknesses and competes effectively in the
competitive business world.
The review of the project concerning Financial Services sector
Relevant government regulation
The Australian governance such as the freedom of information act 1982, Privacy act 1988 and
Archives Act 1983 should be checked keenly before the implementation of the project (Miller,
Voas & Hurlburt, 2012). The Aztek Company should also comply with the Australian financial
conduct authority which is concerned with the protection of critical financial information. The
project of allowing employees bring their own devices to the workplace and apply them to
perform their duties does not face a lot of criticism from the government (Ghosh, Gajar & Rai,
2013). However, the Australian government has highlighted some laws which govern the
companies allowing their members of staff to bring their own devices to the workplace. The
constitution has highlighted that it is the wish of the business enterprises to allow their
employees to use their own devices in their place of work. Some of the methods mentioned are
consequences, and vulnerabilities adopted form computer control framework are also reviewed.
The existing industry risk recommendations for the project are addressed.
Data security is also discussed while insisting on the goals of Aztek Corporation. Data security is
very crucial to the project since we are all aware of the threat which can be met when employees
are allowed to bring their own devices to the workplace and execute their duties using the
devices. It is because data security is concerned with the flow of the data and the individual who
will have access to the data. All the aspects concerning the projects are discussed to ensure that it
runs efficiently and keeps Aztek Corporation operating amongst the top companies in Australian
Financial sector and possibly place the company at the top place. The project aims at ensuring
that the Aztek Corporation improves in its areas of weaknesses and competes effectively in the
competitive business world.
The review of the project concerning Financial Services sector
Relevant government regulation
The Australian governance such as the freedom of information act 1982, Privacy act 1988 and
Archives Act 1983 should be checked keenly before the implementation of the project (Miller,
Voas & Hurlburt, 2012). The Aztek Company should also comply with the Australian financial
conduct authority which is concerned with the protection of critical financial information. The
project of allowing employees bring their own devices to the workplace and apply them to
perform their duties does not face a lot of criticism from the government (Ghosh, Gajar & Rai,
2013). However, the Australian government has highlighted some laws which govern the
companies allowing their members of staff to bring their own devices to the workplace. The
constitution has highlighted that it is the wish of the business enterprises to allow their
employees to use their own devices in their place of work. Some of the methods mentioned are
⊘ This is a preview!⊘
Do you want full access?
Subscribe today to unlock all pages.

Trusted by 1+ million students worldwide

BRING YOUR OWN DEVICE (BYOD) PROJECT 7
cell phones, tablets, and laptops. The government has also highlighted that the organizations
should outline the rules which should govern usage of their own devices in their workplace. The
rules should not go against the freedoms and rights of citizens (Harris, Ives & Junglas, 2012).
When an employee breaks the established rules, fines and punishment are applied accordingly
concerning the companies.
i. Some of the most applied rules are:
ii. Ensuring the company's information is not accessible by outside.
iii. Keeping the flow of the data within the employees of the organization.
iv. Not sharing the data with outsiders.
Many organizations do not support the idea of employees using their own devices in the
workplace (Afreen, 2014). It is because of many cases of incompetence’s amongst employees.
Cases have been reported of employees disclosing company's valuable information to the public.
Competitors use the information to identify the strengths and weaknesses of the enterprise, and it
may lead to business failure or poor performance.
The devices are critical and play a significant role towards the achievement of the companies'
objectives. It leads to firms saving on cost since the funs directed to the purchase of the
organization devices becomes limited. Due to the importance associated with the project the
government has opted not to prohibit the system. As a result, the system of allowing employees
use their devices in the workplace is still authorized, and any wishing organization can adopt the
trend. It has been facilitated by the continuous growth of technology (Morrow, 2012). All the
transactions of the business are currently based on technological devices. Without the application
of the devices, the operations would be very tiresome, and many businesses would fail especially
cell phones, tablets, and laptops. The government has also highlighted that the organizations
should outline the rules which should govern usage of their own devices in their workplace. The
rules should not go against the freedoms and rights of citizens (Harris, Ives & Junglas, 2012).
When an employee breaks the established rules, fines and punishment are applied accordingly
concerning the companies.
i. Some of the most applied rules are:
ii. Ensuring the company's information is not accessible by outside.
iii. Keeping the flow of the data within the employees of the organization.
iv. Not sharing the data with outsiders.
Many organizations do not support the idea of employees using their own devices in the
workplace (Afreen, 2014). It is because of many cases of incompetence’s amongst employees.
Cases have been reported of employees disclosing company's valuable information to the public.
Competitors use the information to identify the strengths and weaknesses of the enterprise, and it
may lead to business failure or poor performance.
The devices are critical and play a significant role towards the achievement of the companies'
objectives. It leads to firms saving on cost since the funs directed to the purchase of the
organization devices becomes limited. Due to the importance associated with the project the
government has opted not to prohibit the system. As a result, the system of allowing employees
use their devices in the workplace is still authorized, and any wishing organization can adopt the
trend. It has been facilitated by the continuous growth of technology (Morrow, 2012). All the
transactions of the business are currently based on technological devices. Without the application
of the devices, the operations would be very tiresome, and many businesses would fail especially
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser

BRING YOUR OWN DEVICE (BYOD) PROJECT 8
those operating online. When employees use their devices in working places, they are likely to
perform better only that the project is associated with some serious information technology risks.
Financial services sector review
Aztek Corporation is one of the most established companies in the area of financial services
venturing in Australia market. The segment is associated with a lot of risks. The company is
highly concerned with ensuring confidentiality of its data. The company also intends to ensure
the established goals are realistic by initializing projects supporting the objectives (Singh, 2012).
The organization is also concerned on utilizing the available resources adequately to propel
smooth running of the daily activities. Allowing employees use their devices in the
implementation of their duties is amongst the proposed project which aims to save adversely on
capital.
The financial services industry has also established certain regulations with governing the
execution of functions of companies venturing into that industry. The regulations are by the
established business laws by the government of Australia (Sangani, 2013). The Australian
government fully supports and encourages business to adopt information technology in their
operations, since IT is associated with saving on cost. Business operating in the Australian
financial industry should all observe the established conditions when it comes to adopting and
incorporating new projects. The production limits the organizations on ensuring that any
endeavors do not have any adverse effect on other firms. However, creativity is highly
appreciated in the market and businesses have the permission to adopt new trends based on
creativity. The proposed project by the Aztek Corporation will not face any criticism from other
organizations venturing the industry (Mansfield, 2012). It is recommended that the company
implements the project keenly and highly minimize on the shortcomings.
those operating online. When employees use their devices in working places, they are likely to
perform better only that the project is associated with some serious information technology risks.
Financial services sector review
Aztek Corporation is one of the most established companies in the area of financial services
venturing in Australia market. The segment is associated with a lot of risks. The company is
highly concerned with ensuring confidentiality of its data. The company also intends to ensure
the established goals are realistic by initializing projects supporting the objectives (Singh, 2012).
The organization is also concerned on utilizing the available resources adequately to propel
smooth running of the daily activities. Allowing employees use their devices in the
implementation of their duties is amongst the proposed project which aims to save adversely on
capital.
The financial services industry has also established certain regulations with governing the
execution of functions of companies venturing into that industry. The regulations are by the
established business laws by the government of Australia (Sangani, 2013). The Australian
government fully supports and encourages business to adopt information technology in their
operations, since IT is associated with saving on cost. Business operating in the Australian
financial industry should all observe the established conditions when it comes to adopting and
incorporating new projects. The production limits the organizations on ensuring that any
endeavors do not have any adverse effect on other firms. However, creativity is highly
appreciated in the market and businesses have the permission to adopt new trends based on
creativity. The proposed project by the Aztek Corporation will not face any criticism from other
organizations venturing the industry (Mansfield, 2012). It is recommended that the company
implements the project keenly and highly minimize on the shortcomings.

BRING YOUR OWN DEVICE (BYOD) PROJECT 9
Review of the project impact on the current security posture of Aztek
The idea of allowing employees carry and use their devices in working place will have an
adverse effect to the Aztek Corporation. The results are expected to be negative since the
companies information is exposed to the threat of possible access by the public (Diester &
Kleiner, 2013). It is because some employees may carry the company's information to their
homes whereby there friends and relatives cab access it. Business information is usually very
confidential and should not be displayed to the public.
Current Security Aztek Posture
Currently, the Aztek Corporation manages all its information technology (IT) applications and
resources (Harris & Patten, 2014). The own maintenance of the organization information
technology explains its security posture. The information concerning the company cannot be
accessed unless one connects to the company network. Aztek Corporation network is managed
by experts permanently employed by the organization (Watson, 2017). Employees deployed in
remote areas are extensively authenticated, and access management mechanisms are used. The
company is therefore in a position of monitoring, managing and changing the security framework
based on its own will. The applied security posture in Aztek Corporation is associated with some
risks, but the organization is assured of data security.
Aztek decides to allow the employees bring their devices to their place of work. The suggested
devices are mobile phones, tablets, and laptops (Erbes, Nehzhad & Graupner, 2012). The
employees are to use the devices as the primary or sole tools in the performance of their duties.
A recently conducted research stated that allowing employees use their devices in the place of
work is likely to pose many threats to the organization's data. The risk is associated with the
carelessness of employees and incompetency. The project is expected to have various benefits
Review of the project impact on the current security posture of Aztek
The idea of allowing employees carry and use their devices in working place will have an
adverse effect to the Aztek Corporation. The results are expected to be negative since the
companies information is exposed to the threat of possible access by the public (Diester &
Kleiner, 2013). It is because some employees may carry the company's information to their
homes whereby there friends and relatives cab access it. Business information is usually very
confidential and should not be displayed to the public.
Current Security Aztek Posture
Currently, the Aztek Corporation manages all its information technology (IT) applications and
resources (Harris & Patten, 2014). The own maintenance of the organization information
technology explains its security posture. The information concerning the company cannot be
accessed unless one connects to the company network. Aztek Corporation network is managed
by experts permanently employed by the organization (Watson, 2017). Employees deployed in
remote areas are extensively authenticated, and access management mechanisms are used. The
company is therefore in a position of monitoring, managing and changing the security framework
based on its own will. The applied security posture in Aztek Corporation is associated with some
risks, but the organization is assured of data security.
Aztek decides to allow the employees bring their devices to their place of work. The suggested
devices are mobile phones, tablets, and laptops (Erbes, Nehzhad & Graupner, 2012). The
employees are to use the devices as the primary or sole tools in the performance of their duties.
A recently conducted research stated that allowing employees use their devices in the place of
work is likely to pose many threats to the organization's data. The risk is associated with the
carelessness of employees and incompetency. The project is expected to have various benefits
⊘ This is a preview!⊘
Do you want full access?
Subscribe today to unlock all pages.

Trusted by 1+ million students worldwide

BRING YOUR OWN DEVICE (BYOD) PROJECT 10
for the company, but the confidentiality of the organization's information becomes an area of
concern.
The responsibility of security should be shared between the provider and the consumer. Exposing
company's information such as the payroll information of employees or account details to the
public becomes very dangerous. The company can risk closure and high fine by the government
when some confidential information concerning the employees is portrayed to the public.
Information is showing daily productions; daily sales should only be shared amongst people
within an organization (Diaz, Chiaburu, Zimmerman & Boswell, 2012). Leaking the information
to the public could even end up reaching the team competitors. Competitors could use the
information to establish and analyze the strengths and opportunities enjoyed by the firm.
Competitors then develop mechanisms to ensure that they outdo the organization in competition
(Webster, 2014).
Financial services industry deals with sensitive information. When the information is exposed to
the public, it may come to contact with the clients. The organization can become a victim since
the customers can opt to sue the company (He, 2013). Disclosure of client's financial information
to the public would lead to adverse effect. Since the company has decided to venture in the
industry which can be faced by a lot of threats and vulnerabilities as far as information
confidentiality is concerned the firm should adopt mechanisms to curb the challenge.
The employees should be informed on how they should handle the data to ensure confidentiality
(White, 2012). The employees should be advised by any chance at any time they should not
disclose data to the public. Data should be shared only amongst the staff of the Aztek
organization. The devices used should contain pins and password ensuring that they are not
accessible to anybody. Allowing employees use their devices does not imply that they take
for the company, but the confidentiality of the organization's information becomes an area of
concern.
The responsibility of security should be shared between the provider and the consumer. Exposing
company's information such as the payroll information of employees or account details to the
public becomes very dangerous. The company can risk closure and high fine by the government
when some confidential information concerning the employees is portrayed to the public.
Information is showing daily productions; daily sales should only be shared amongst people
within an organization (Diaz, Chiaburu, Zimmerman & Boswell, 2012). Leaking the information
to the public could even end up reaching the team competitors. Competitors could use the
information to establish and analyze the strengths and opportunities enjoyed by the firm.
Competitors then develop mechanisms to ensure that they outdo the organization in competition
(Webster, 2014).
Financial services industry deals with sensitive information. When the information is exposed to
the public, it may come to contact with the clients. The organization can become a victim since
the customers can opt to sue the company (He, 2013). Disclosure of client's financial information
to the public would lead to adverse effect. Since the company has decided to venture in the
industry which can be faced by a lot of threats and vulnerabilities as far as information
confidentiality is concerned the firm should adopt mechanisms to curb the challenge.
The employees should be informed on how they should handle the data to ensure confidentiality
(White, 2012). The employees should be advised by any chance at any time they should not
disclose data to the public. Data should be shared only amongst the staff of the Aztek
organization. The devices used should contain pins and password ensuring that they are not
accessible to anybody. Allowing employees use their devices does not imply that they take
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser

BRING YOUR OWN DEVICE (BYOD) PROJECT 11
company's data at their homes. After achieving the daily chores, the data should not be made to
homes (Lazaroiu, 2015). It should be deleted, and any employee is taking data back the
significant fines should be applied accordingly.
The concept of BYOD (Bring Your Own Device)
Globally, various organizations are permitting their employees to bring their laptops, tablets, and
smartphones at their workplaces to complete their daily tasks. The employees access the
company's data from their gadgets. The concept as adopted the name BYOD which is the initial
for Bring Your Own Device in the information technology (IT) perspective. The incorporation of
BYOD in the Aztek Corporation will be initiated by the IT department of the organization. The
project will firstly require selection of viable software application for managing the devices
brought by employees in their workplace. A connection to the network should be initiated, and
possibly the link should be standard (Andriole, 2012). Rules and guidelines should be established
which should govern how the employees are going to use the devices in the workplace. The
employees should sign a legal agreement designed by the company acknowledging the
understanding of the terms and conditions of the policy.
IT Platform factors impacting BYOD Concept
According to research conducted recently, most IT professionals up to date have not established
adequate policies to protect data on companies incorporating the BYOD concept (Dreher, 2014).
When employees connect their own devices to the organizational network, the confidential data
is faced with various risks. Financial information is susceptible, and it should not be exposed by
any chance. The employee's devices may contain viruses which may interfere with the
organization's gadgets leading to data loss. Important files can be interfered with posing a
challenge to the operation of the firm.
company's data at their homes. After achieving the daily chores, the data should not be made to
homes (Lazaroiu, 2015). It should be deleted, and any employee is taking data back the
significant fines should be applied accordingly.
The concept of BYOD (Bring Your Own Device)
Globally, various organizations are permitting their employees to bring their laptops, tablets, and
smartphones at their workplaces to complete their daily tasks. The employees access the
company's data from their gadgets. The concept as adopted the name BYOD which is the initial
for Bring Your Own Device in the information technology (IT) perspective. The incorporation of
BYOD in the Aztek Corporation will be initiated by the IT department of the organization. The
project will firstly require selection of viable software application for managing the devices
brought by employees in their workplace. A connection to the network should be initiated, and
possibly the link should be standard (Andriole, 2012). Rules and guidelines should be established
which should govern how the employees are going to use the devices in the workplace. The
employees should sign a legal agreement designed by the company acknowledging the
understanding of the terms and conditions of the policy.
IT Platform factors impacting BYOD Concept
According to research conducted recently, most IT professionals up to date have not established
adequate policies to protect data on companies incorporating the BYOD concept (Dreher, 2014).
When employees connect their own devices to the organizational network, the confidential data
is faced with various risks. Financial information is susceptible, and it should not be exposed by
any chance. The employee's devices may contain viruses which may interfere with the
organization's gadgets leading to data loss. Important files can be interfered with posing a
challenge to the operation of the firm.

BRING YOUR OWN DEVICE (BYOD) PROJECT 12
Positive impacts
i. Employees would have hassle-free experience of using the same devices in their homes
and workplace.
ii. The access to information from their emails and organizational departments becomes
active.
iii. The project boosts morale and productivity of work.
iv. The Aztek Company will save on cost when it comes to purchasing hardware
infrastructure.
v. The BYOD concept is very flexible.
Negative impacts
i. The company information will be exposed to threats and vulnerabilities.
ii. The organization will not be able to control the number of devices accessing their
network.
iii. The organization's gadgets will have the possibility of adopting virus.
Risk Assessment
The concept of BYOD is associated with various threats, vulnerabilities, and consequences as the
shortcomings. The risks should be assessed and necessary mechanisms applied to curb them
accordingly. The following are the threats vulnerabilities and consequences.
Threats
The risk of managing unknown third-party access and mobile applications
Positive impacts
i. Employees would have hassle-free experience of using the same devices in their homes
and workplace.
ii. The access to information from their emails and organizational departments becomes
active.
iii. The project boosts morale and productivity of work.
iv. The Aztek Company will save on cost when it comes to purchasing hardware
infrastructure.
v. The BYOD concept is very flexible.
Negative impacts
i. The company information will be exposed to threats and vulnerabilities.
ii. The organization will not be able to control the number of devices accessing their
network.
iii. The organization's gadgets will have the possibility of adopting virus.
Risk Assessment
The concept of BYOD is associated with various threats, vulnerabilities, and consequences as the
shortcomings. The risks should be assessed and necessary mechanisms applied to curb them
accordingly. The following are the threats vulnerabilities and consequences.
Threats
The risk of managing unknown third-party access and mobile applications
⊘ This is a preview!⊘
Do you want full access?
Subscribe today to unlock all pages.

Trusted by 1+ million students worldwide
1 out of 20
Related Documents
Your All-in-One AI-Powered Toolkit for Academic Success.
 +13062052269
info@desklib.com
Available 24*7 on WhatsApp / Email
Unlock your academic potential
Copyright © 2020–2025 A2Z Services. All Rights Reserved. Developed and managed by ZUCOL.





