Monday, August 26, 2019
Bring Your Own Device (BYOD) Assignment Example | Topics and Well Written Essays - 1500 words
Bring Your Own Device (BYOD) - Assignment Example However, these activities also come with much security challenges to the interested organizations. It interferes with the IT community in the group both physically and in ownership of these assets. The real challenge is for these organizations to establish a procedure to accommodate these devices, develop a support mechanism for their works and one that would amicably comply with the security measures put in place. An organization is encountered with similar risks that are posed by BYOD spanning their usage, geographical domain, and the risk profile. BYOD merely magnifies the already existing risks. The landscape risks are categorized into risks relating to the app, management of the environment the mobile is used, and securing the mobile devices. Before the inception of BYOD, it was easier to manage and protect an organizations devices from the now very many risks. It was so because most of these components were acquired from a similar manufacturer who provided a unified management interface platform (Rene Millman, 2012). It was part of an institutionalized security policy control that was consistently and persistently applied. Currently, this is a rather bigger challenge since most of the devices brought by workers in the various organizations are of different types and makes. They are also sourced from different manufacturers and come in various makes and models. They further have been architected to exist on their own and not in an enterprise surrounding with lots of management utilities around. Whereas the case of security risk began long ago even when there were less diverse devices, it has been aggravated by the varied and multiple devices users currently have. They all want to connect a multitude of them to the organizations infrastructure. The latter point does not only scale the number of devices to be secured at any point, it also complicates how this security is deployed since most have varied levels of effectiveness and run on different
Subscribe to:
Post Comments (Atom)
No comments:
Post a Comment
Note: Only a member of this blog may post a comment.