Chat with us, powered by LiveChat 430 Topic 3 DQ 2 100-150 words Bring Your Own Device - STUDENT SOLUTION USA

430 Topic 3 DQ 2 100-150 words

Bring Your Own Device (BYOD) and the Internet of Things (IoT) are opening the doors to vulnerabilities and threats for organizations. How would you manage the growth of these concepts? Discuss the repercussions BYOD and IoT policies can have on employee wellness.

Reply to responses 75 -100 words.

A Cody

Bring Your Own Device, or BYOD, and Internet of Things, or IoT, devices have become more and more popular in workplace environments overtime. This is because of how advanced and useful they have become, as well as how dependent coworkers are of their BYOD devices. The only wrong thing about bringing these devices into a work environment is that they bring many threats into the work environment and network. This where the right amount of policies, hardware configurations, and software must be implemented. For instance, a popular way that intruders make their way into corporate networks could be through a virus on a phone or through a malicious app on a BYOD device that then enters the network. Something interesting and useful that I found is to implement containerization within mobile devices. ?Containerization is a way to divide each part of a device into its own protected environment, each with a different password, security policies, applications and data…Cyber criminals that breach the general workspace are completely contained within it and cannot laterally move to the other protected environment?(?BYOD security?, 2021). This is the perfect thing for a corporation to put into their arsenal to fight against threats from BYOD an IoT devices. After implementing this, you could get employees to sign and acknowledge a security policy in which states that employees may only use the containerized part of their BYOD and IoT devices when they use them within a certain perimeter around the company they work at. Although, this should not be the only strategy a company should implement. There should be many more combinations like this put in place.

References

BYOD security: Threats, security measures and best practices. Hysolate. (2021, March 11). Retrieved March 23, 2022, from https://www.hysolate.com/learn/byod/byod-security-threats-security-measures-and-best-practices/?

B Shauna

When it comes to an employee bringing their own device to the workplace there are a few things each device should go through before being allowed on the companies network. They should first have to be registered with the IT department and go through a series of test to see what security risk there is on the device if any at all. The employee should be made well aware of things needed to change on device in order to be allowed on the companies network. I think it is important for these devices to be scanned for any type of open ports or vulnerabilities on the device. The BYOD and IoT policies may not always be a good idea due to the fact this is their personal device and they have their own personal things saved on that device. This may become an issue if a device is having to be check for vulnerabilities it may upset an employee because they do not want someone from their workplace looking at what private information they have stored on their personal device. I think if all possible it is best to just stay away from using personal devices while at work or for work.

C Jessica

Bring Your Own Device (BYOD) allowances within businesses bring new vulnerabilities to the network that are difficult to manage and maintain. BYOD has gained popularity as it has become more and more common for an individual to carry personal IoT devices, such as smartphones, tablets, laptops, ect. From a business perspective, the idea of having employees supply their own network devices needed to function and perform their tasks lessens the costs of maintaining and owning the hardware. From an employee perspective, it is highly convenient to maintain personal affairs on the same device as they use for work because it consolidates everything they need into only one or two places rather than having to maintain separate devices for work and personal matters. There have also been several studies performed that companies that allow BYOD have a higher worker morale and productivity (Hollander, 2019).??

So even though allowing BYOD lessens hardware maintenance costs and improves productivity, it also comes with serious risks. The main risks to BYOD is, of course, consequences of human error. If an employee has their personal device infiltrated or stolen, it opens up a massive vulnerability to the company network, both for loss of data or potential legal issues (Hollander, 2019). The best way to combat these risks is to first consider the benefits and consequences of enabling BYOD for the network. If BYOD has been approved, then the company will need to create a strict BYOD policy that details exactly what is allowed and what is not, and to also detail a disaster recovery plan in case there is a breach with a BYOD device. Once that policy has been launched company wide, it will also be the company?s responsibility for evaluating the policy and adjusting it as needed for increased security.?For IoT devices, there are similarities in the dangers of introducing them to the network. As IoT devices are being constantly created, updated, and altered, it is very difficult to ensure that each device has the most up-to-date security measures enabled. Therefore, the IoT devices have a high probability of being insecure and highly vulnerable with the additional fact that the IT Administrator might not have full visibility or access to them. (7 Internet of Things Threats and Risks to Be Aware Of, 2021). The recommendations for IoT devices are similar in that the company must decide if IoT devices will even be allowed on the network. If so, they must be aware of the potential risks, and actively work on preventative measures constantly. They must also consider the employee?s well being regarding this as well. Many IoT devices are future-age and fascinating at this current time, but there are others that have practical uses. The company must decide if the benefits of using these vulnerable IoT devices is worth the risk in the worst possible situation.?

error: Content is protected !!