Some organizations have implemented bring your own device (BYOD) ?policies. This enables organizations to save money on equipment costs ?because
Some organizations have implemented bring your own device (BYOD) policies. This enables organizations to save money on equipment costs because employees are now using their personal computers. At the same time, BYOD policies also present challenges for organizations. Now organizations are in the business of supporting personal computers.
Go to Basic Search: Strayer University Online Library to locate and integrate at least two quality, academic resources (in addition to your textbook) on BYOD policies and the challenges associated with them. You may also use government websites, such as Cybersecurity from the National Institute of Standards and Technology.
Please respond to the following in a post of at least 200 words:
- Describe some of the specific challenges (for example, risks of employees going to various websites, viruses, and legal implications) associated with BYOD policies.
- Recommend methods organizations can use to address the challenges associated with BYOD policies.
- Provide full citations and references, formatted according to Strayer Writing Standards.
- For assistance and information, please refer to the Strayer Writing Standards link in the left-hand menu of your course. Check with your professor for any additional instructions.
In 60 to 75 words, please respond to at least one other post. Choose to respond to those who have few or no responses.
1 hour ago
Rachelle Britton
RE: Week 5 Discussion
Top of Form
Week 5 Discussion
· Describe some of the specific challenges (for example, risks of employees going to various websites, viruses, and legal implications) associated with BYOD policies.
Some challenges organizations might face with their bring your device policies are a lack of control of the personal device if it is lost or stolen. Not having administrative rights and what the employee does personally on their device might be against company policy on corporate-owned devices.
· Recommend methods organizations can use to address the challenges associated with BYOD policies.
Organizations should have a long-term plan to maintain their security objectives, with the proper controls to meet those objectives. Wireless devices should be one of the areas covered in the policy along with BYOD. The policy must address encryption, firewalls, network security, and termination of access for these devices. The plan should clearly outline the rules and practices associated with their BYOD policy. Organizations can provide training to any colleague who has signed up for BYOD and have them attest that they understand the policy. The content of the policy should contain an overview of the policy, the purpose of the policy, what is in scope, and who the targeted audience should be.
References:
William Stallings. 2019. Effective Cybersecurity: A Guide to Using Best Practices and Standards.
Bottom of Form
Collepals.com Plagiarism Free Papers
Are you looking for custom essay writing service or even dissertation writing services? Just request for our write my paper service, and we'll match you with the best essay writer in your subject! With an exceptional team of professional academic experts in a wide range of subjects, we can guarantee you an unrivaled quality of custom-written papers.
Get ZERO PLAGIARISM, HUMAN WRITTEN ESSAYS
Why Hire Collepals.com writers to do your paper?
Quality- We are experienced and have access to ample research materials.
We write plagiarism Free Content
Confidential- We never share or sell your personal information to third parties.
Support-Chat with us today! We are always waiting to answer all your questions.