You are on page 1of 1

 What is BYOD?

Bring your own device (BYOD) refers to the trend of employees using personal devices to connect to their
organizational networks and access work-related systems and potentially sensitive or confidential data. Personal devices
could include smartphones, personal computers, tablets, or USB drives.

 How have organizations responded to BYOD?

An organization cannot leave that task up to individual employees. Many IT organizations have responded with
BYOD policies and procedures that enable employees to use their personal devices for work, define what they are allowed
to do with them, and specify how security and support for them will be managed

 How have organizations adapted to BYOD with networking?

Bring Your Own Device (BYOD) is a vastly adapted policy in which companies allow their employees to use their
own mobile devices for work. This decision brings several positives and negatives for a network environment. Business
owners and network managers must agree on the type of support, additional software to manage mobile devices such as
mobile device management (MDM) software, amendments to the network security policy, creating a separate BYOD policy,
and Voice over IP (VoIP) usage, to name just a few things. This article explores some of these areas of consideration for
implementing a BYOD policy.

Security should be the main concern when adopting BYOD into a network. Employees will bring multiple devices
using multiple operating systems connected to multiple wireless and service networks.

 What areas of risk have been identified for BYOD?


1. Opportunities for Data Theft. BYOD policies make it easy to stay in contact with your employees. ...
2. Malware Infiltration. ...
3. Potential Legal Issues. ...
4. Device Loss or Theft. ...
5. Poor Mobile Management. ...
6. Lack of Employee Training. ...
7. Shadow IT.
 What does the future hold for BYOD?

The flexibility offered by remote working and the cost savings associated with smaller premises and reduced
hardware outlay are important drivers, as are delivering improvements to work life balance and reducing the
environmental impacts of commuting.

Security

Most sensible businesses treat the integrity of their data very seriously and invest time and money in firewalls,
password protection and anti-virus software.

You might also like