Sandhya Bhat
  • Home
  • Business Excellence
  • Process Design
  • Strategic Consulting
  • Program Leadership
  • Articles & more
    • Articles
    • Corporate Wisdom
  • Ask Me
    • Terms & Conditions
    • Leisure >
      • Artistic Endeavors
      • Exploring Aviation
      • Health & Wellness

Why Bring Your Own Device (BYOD) Can Be A Security Risk To Your IT (Information Technology) Infrastructure

12/1/2014

0 Comments

 
Picture
If there is one workplace trends that dramatically change how an employee performs his or her role that would be BYOD. BYOD stands for bring your own device wherein workers are allowed to bring their own smartphone, laptop or tablet in the workplace to use after connecting it to the firm’s network.

Based on a 2012 survey conducted by Cisco, about 600 firms with over 1,000 employees allow the staff of bringing their own devices. It was found out that 95% of all IT departments are actually employing this concept, and it is not necessarily a secret why these firms are doing such. Each firm saves up to $300,000 yearly per 500 employees by allowing them to carry with them their own devices. The bigger the company the higher the operational cost savings.

The question now is: is BYOD so beneficial that it can outweigh the firm’s security risks?
Let’s all remember that BYOD is not 100% about benefits; with BYOD comes greater risks. If these risks (not just security risks though most are related to such) are not addressed during the implementation, this can lead to more organizational and operational issues than what BYOD essentially solves.

There are at least three issues that these firms have to look at-
First, it would be very difficult for any IT department to regulate the wide range of devices brought in the workplace. Definitely, the employees will present multitudes of devices with different operating systems and with different versions. Many a reasons why this setup can only lead to systems fragmentation when there are devices, systems and platforms that are agnostic when possible security threats are tackled. For one, implementing management centralization will be harder.

Second, there will be lack of customer data encryption. For the IT department, protecting customer data will be more challenging since this data are only encrypted on authorized devices most of the time based on the survey conducted by ESET, a firm that basically deals with Internet security. The problem with brought devices is that they are owned by the employees and that while they contain company data, these devices cannot be configured based on the preferences of the firm.

Third, the devices are not ‘firewalled.’ Even when the employees use the devices inside or outside the workplace, they still contain confidential data that once a device is subverted other person or entity may gain access to the data contents. The worst part is, he, she, they or it may gain access not only to the data, but also to the entire firm’s network.

Evidently, there are many benefits to BYOD. However, unless these real security issues are addressed, BYOD will remain to be an IT 'pipe dream'! 
​#bringyourowndevice #BYOD #mobiledevice
0 Comments

Your comment will be posted after it is approved.


Leave a Reply.

    Picture
    ​Sandhya Bhat has
    ​developed several strategic methodologies to improve technology and human capital utilization, produce greater ROI on investments and streamline service delivery.

    ​Sandhya has more than nineteen years of experience as a senior strategic Management Consultant with Process Improvement, Business Relationship Management and Project Management specialization. She has particularly utilized Lean Six Sigma, Kaizen and ISO principles along with Scrum and Kanban frameworks. 
    View my profile on LinkedIn

    Categories

    All
    Branding & Communications
    Business Relationship Management
    Career Development
    Change Management
    Continuous Improvement
    Corporate Wisdom
    Demand Management
    Emerging Technology
    Environmental Health & Safety
    External News & Articles
    General Topics
    Green IT
    Human Resources
    Information Management
    Information Technology
    Innovation In Technology
    IT Operations
    IT Security
    Kaizen
    Leadership
    Lean Six Sigma
    Learning & Development
    Motivational Mondays
    Organizational Development
    Organizational Effectiveness
    Process Mapping & Improvement
    Program & Project Management
    Quality Management Systems
    Read Of The Week
    Risk Management
    Security & Governance
    Service Delivery Models
    Strategies & Methodologies
    Strategy & Planning
    Sustainable Corporations
    Talent Management
    Team Building
    Tech Thursday
    Thought For The Week
    Videos Corporate Wisdom
    Videos Information Services
    Videos- Information Services
    Weekly Watch-List
    Weekly Wishes & Updates
    Work & Life Balance

    Learning & Development

    Picture
    Check out our channel...
    Picture
    Picture
    Picture
    Picture

    Books on
    Business & Management

    Picture
    Picture
    Picture
    Picture
    Picture
    Picture

    Books on
    ​Health & Wellness

    Picture
    Picture
    Picture
    Picture
    Picture
© ​ Copyright 2021  Sandhya Bhat & Macro2Micro Media ***ALL RIGHTS RESERVED*** 
View our 
Terms & Conditions before using this site and you can contact us here.