Thursday, March 9, 2017

BYOD

Hi Let's know about
 BYOD



What is BYOD?

Bring your own device (BYOD),also called bring your own technology (BYOT), bring your own phone (BYOP), and bring your own Personal Computer (BYOPC).This mean giving permission to bring their own devices(smartphones,laptops,tablets,usb drivers) to work place.

Actually BYOD come up with IT Consumerization(blending of personal and business use of technology devices and applications).surely we can classify two types of BYOD.


   a) Companies buy mobile devices for employees.

b) Employee can use their own mobile devices.

For a example, if the company is providing the device (type b), it probably will block installations of things: Games, for example. Also, the company may use secret software to see what you have been doing on the device: keylogger for example. Of course, they will allow private use of the devices but that will be a little tricky method taken by the company.

According to BYOD,CISCO create brand name Borderless network to identify set of hardware and software technologies which allow anyone,anytime,anywhere,on any device to connect organization network.


BYOD Policy?

If you awilling to use this concept you should have BYOD policy otherwise your company might be in big trouble in secure hand. To convey this BYOD in correct path we have to implement rules and regulation like this.

#1 Educate the Employees

If you have already implemented BYOD, You need to tell them how to keep the device protected with latest updates and patches for the operating system and hardware they are using on their mobile devices. You need to tell them about possibility of data leaks and how it can affect to the company. You need to make it clear that privacy of organization’s data cannot be compromised.

#2 One Platforms to Allow


You cannot let users to select any platform. If your organizations cannot run on any specific operating system such as the iOS, you have to tell your employees about that.

In a better method, you can give them a list of two-three platforms that are acceptable. That would bring in good consistency so that you do not have to hire additional IT people to troubleshoot the devices.


#3 Non-Disclosure Agreement


Make the employees sign with CA (confidentiality agreement) where they cannot share company data with any third party. Make them aware of social engineering and teach them methods to keep the data under lock.

#4 Logging & Responsibility


Logging the events can help you identify if any employee has been engaging in illegal activities such as downloading pirated movies. In this case, you also need to tell the employees that they will not allowed to do those kind of things.

#5 Tracking and Remote Deletion of Data


Another important aspect when creating a good BYOD policy, tracking the mobile device is more for the safety of the organization’s data and NOT to know what the employee is up to. This is helpful when:



   1. An employee loses the device.

2. An employee leaves the job.



And also we can do:

1. Registering the MAC addresses of devices
– This helps in blocking illegal connections to the corporate network

2. Auditing the Network Check the network for any possible vulnerabilities and keep a check on the number of devices connecting to it.

3. Create a company cloud
- so that users who are working remotely can store things to the common shared space instead of plugging into your network again and again. That will reduce the chances of a security breach.



Why we use BYOD concept?



1. BOYD Increases Productivity.

In my opinion every business owner wants to increase their productivity, and with BYOD, that is possible.

If you allow your employees to use their personal devices for work - then you're giving them the flexibility to work on their own timeframe. Also, by allowing employees to bring their own devices, they can easily organize and answer important business e-mails wherever they are. At the same time, they have the freedom to still be connected with their personal life via social media networks. As a result of they love to do their job in every minutes without wasting. Finally it reached workers satisfaction and high productivity.

2. BOYD connects all age groups

In a business culture there is no pointing arguing ages, the person who can come excellent ideas and activities they approve he is a good guy.
In BYOD offer to younger generation and older employees to establish a connection using mobile devices, and it is a opportunity to exposed to new gadgets to improve their productivity. Not only that dis abled people also can connect through this and support to income.

3. Lower IT Spending

With implementation of BYOD, The Consumerization of IT is becoming popular in large corporations and government agencies. By allowing employees to bring their devices to work, company expenditures are decreased. Aside from additional expenses, worker delays and hardware maintenance delays are now limited. 

4. Lower Security Risk

All-important company information will be stored up in the cloud. This means that the employee’s device is just a tool to access information. In an event that the device is stolen, all the company needs to do is remove the device's access. Problem solved.

5. Work Anywhere


BOYD promotes the use of personal device usage. This encourages employees to do some of the required tasks at home, and they can continue working on a tablet or smartphone on their way to work. This also improves office communication as emails can be quickly answered, presentation drafted, and documents reviewed quickly. It is clear that a BYODculture greatly enhances employee productivity and connectivity.

6. Cost Saving


With a BYOD program on an enterprise wireless network, businesses can transfer operating costs to the user. Companies can save a lot of money all of the costs for the mobile devices, services, and other associated expenses.


Drawbacks

Costs for the employee –

Employees may not like to purchase highly recommended mobile devices for sometimes, because they have to bring those devises day today, and have to pay more attention to those devises. Not only that when it come up with hardware failure or software failure employees should have to repair those things, otherwise there is no pointing coming next day to the office without empty hand. Finally they may not in happy engaging these kind of concepts.

Security –


Companies all spend a very large amount of money on their security systems. Employees however are unlikely to have this level of security. 

Quality Security –


Viruses and Spyware can cause untold damage to your business. So before setting BYOD up, research the security options available and see if they will cover what you need.

Agreements –


Make sure your employees know exactly where they stand. Ensure there are agreements in place before any policy is introduced detailing who is responsible for what costs and what happens if any employee leaves the company.

3 companies showing Success of BYOD

  • Intel
  • SAP
  • Blackstone




What is MDM?


Cisco devices support Mobile Device Management (MDM) features to secure, monitor and manage mobile devices including corporate -owned devices and employed owned devices.


Critical MDM functions for a BYOD Network


Data Encryption - The devices which supported to encryption it allows to connect network and access cooperate content.

PIN enforcement
- Using password policy to make password and it reduce the probability of brute force attacks.


Data wipe - lost or stolen devices data can remotely wipe by authorized access.


Data Loss Prevention (DLP) -
Avoid authorized users to leak critical information to outside world, avoiding doing careless or malicious things with this important data.

Jailbreak/Root detection -
this mean bypass the management of a device, identify those bypasses and get immediately action for avoid connecting network or corporate assets.




Mmmmm finally I think you have  got an idea about what is BYOD and kindly give me your feedback on my article. Highly appreciate if you can share your knowledge with me.


Hope to see you soon.......😊

Thanks!
Best Regards,
Pamoda P. Perera

No comments:

Post a Comment