Introduction to BYOD EIT, Author Gay Robertson, 2017.

Slides:



Advertisements
Similar presentations
Speaker Name, Title Windows 8 Pro: For Small Business.
Advertisements

Bring Your Own Device Learning in the 21 st Century.
INADEQUATE SECURITY POLICIES Each covered entity and business associate must have written polices that cover all the Required and Addressable HIPAA standards.
Cloud Computing EDT Cloud Computing Overview Cloud Computing can be defined as a network of applications, services, and infrastructure that are.
Invasion of Smart Phones in Clinical Areas Chrissy Kyak Privacy Officer University of Maryland Upper Chesapeake Health.
BBB Technology and Computers Connection Group Presented by: Cary M. Root Root-InfoTech.com.
YOUR INTERNET EXPERIENCE
SAM for Mobile Device Management Presenter Name. of employees spend at least some portion of their time working outside their office. Mobility is the.
CLOUD COMPUTING.  It is a collection of integrated and networked hardware, software and Internet infrastructure (called a platform).  One can use.
Mobile technologies in the Classroom 21 st Century Learning What are mobile technologies? Mobile technologies are portable, wireless, and Wi-Fi enabled.
BRING YOUR OWN DEVICE. BYOD AND THE IMPACT ON IT SECURITY BYOD and pressure employees put on IT organization to supply or allow consumer mobility devices.
Using Technology to Manage Information Chapter 14.
Security considerations for mobile devices in GoRTT
Cloud Computing Characteristics A service provided by large internet-based specialised data centres that offers storage, processing and computer resources.
© 2012-Robert G Parker May 24, 2012 Page: 1 © 2012-Robert G Parker May 24, 2012 Page: 1 © 2012-Robert G Parker May 24, 2012 Page: 1 © 2012-Robert G Parker.
ISC 2016 Parent Information Session. What is BYOD? BYOD means Bring Your Own Device.
Kacper Rams, Matt Starr, Megan Stephens. Overview BYOD Introduction Risks Controls.
COMP1321 Digital Infrastructure Richard Henson University of Worcester December 2012.
Cyber Security in the Mobile Era KEEPING ENTERPRISE DATA SAFE IN THE BYOD ERA.
BYOD: An IT Security Perspective. What is BYOD? Bring your own device - refers to the policy of permitting employees to bring personally owned mobile.
Office 365 is cloud- based productivity, hosted by Microsoft. Business-class Gain large, 50GB mailboxes that can send messages up to 25MB in size,
Šarūnas Končius Technology Strategist of Microsoft Microsoft Lithuania.
BizSmart Lunch & Learn Webinar Information Security and Protecting your business With the increased risk of some sort of cyber- attack over the past few.
THE CONSUMERIZATION OF IT By Patricia Coonelly, Anthony Dipoalo, Tom Stagliano.
Workshifting Transform your business – empower your people.
Copyright © 2013 OneNeck IT Services Corporation. All rights reserved. Desktop as a Service: Why One Company Established a Virtual.
Computing Essentials Plan Syllabus Class is more difficult than many previous students predicted Value of class Content.
Protecting Data, Sharing Information Graham Wakerley: Director
Barracuda SSL VPN Remote, Authenticated Access to Applications and Data Version 2.6 | July 2014.
IMPACT OF ICT.
Mobile Devices, BYOD, and the Workforce: Responsible Mobile Computing,
Office 365 is cloud-based productivity, hosted by Microsoft.
Traditional Classroom vs Computer Mediated Classroom (CMC)
Using Office 365 Across All Your Devices
The Internet and connections
Using Technology to Manage Information
Chapter 1 Foundations of Information Systems in Business.
Challenges facing Enterprise Mobility
Mobile Applications Applied to Information System
SmartHOTEL Planner Add-In for Outlook: Office 365 Integration Enhances Room Planning, Booking, and Guest Management for Small Hotels and B&Bs OFFICE 365.
© 2013 Jones and Bartlett Learning, LLC, an Ascend Learning Company All rights reserved. Page 1 Fundamentals of Information Systems.
Emerging Technologies
Introduction to Wireless Technology
Impact of IT Consumerisation on Enterprise Security
Learning and Working in the 21st Century Classroom
Cloud Storage - an introduction
Trends in my profession, Information Technology
A Modern Intranet Integration that Extends the Value of Your Microsoft Office 365 Deployment, Boosts Productivity, and Enhances Collaboration OFFICE 365.
Topic 5: Online Communities Press F5 to view!
Smart Org Charts in Microsoft Office 365: Securely Create, Collaborate, Edit, and Share Org Charts in PowerPoint and Online with OrgWeaver Software OFFICE.
© EIT, Author Gay Robertson, 2017
All About Business Phone Systems
Introduction to Mobile Devices
Call AVG Antivirus Support | Fix Your PC
Mobile County Public Schools
+Vonus: An Intuitive, Cloud-Based Point-of-Sale Solution That’s Powered by Microsoft Office 365 with Tools to Increase Sales Using Social Media OFFICE.
THIS IS A TIPS & TRICKS SLIDE FOR YOU
Why ISO 27001? Subtitle or presenter
BluVault Provides Secure and Cost-Effective Cloud Endpoint Backup and Recovery Using Power of Microsoft OneDrive Business and Microsoft Azure OFFICE 365.
MICROSOFT AZURE ISV PROFILE: ONEBE
ONE® Mail Training Presentation
Privacy Act 1993 EIT, Author Gay Robertson, 2017.
Why ISO 27001? MARIANNE ENGELBRECHT
IT Megatrends that shape the Digital Future…
Introduction to Servers
How would you define media? Give an example
Reportin Integrates with Microsoft Office 365 to Provide an End-to-End Platform for Financial Teams That Simplifies Report Creation and Management OFFICE.
BTEC level 3 Learning Aim D.
E-Safety.
Personal Mobile Device Acceptable Use Policy Training Slideshow
Presentation transcript:

Introduction to BYOD EIT, Author Gay Robertson, 2017

What is BYOD? BYOD stands for Bring Your Own Device Meaning: bringing your own mobile device such as a smartphone, tablet or laptop to work and use the device on the company’s network; accessing, and storing company data on the device for work tasks

This trend has come about with the freedom of being able to carry small mobile computing devices anywhere and anytime instead of being limited to a big desktop computer sitting on a desk within the workplace The internet and cloud technology have allowed companies to have more ability to connect, communicate and collaborate together

Why BYOD? More and more companies have begun to operate outside of the traditional 9-5 work day. Many have begun trading and operating globally 24/7 thanks to e-commerce This shift has also lead to more employees working outside of the office and on the go Some companies require employees to travel to other parts of the country to other offices or even overseas Mobile technology allows organisations to operate and trade on a larger scale, and mobile devices allow employees to produce and complete work anytime and anywhere

The effects of BYOD BYOD allows employees to use their own personal device such as their own smartphone or tablet to be able to connect to their work network and access the companies data and files One of the advantages is that the employer doesn’t need to be providing employees with the mobile devices if the employees already own and are happy to use there personal device The employee might also find their own device more familiar and easy to use a different device provided from the company

However BYOD and mobile devices being used on company networks can lead to risks such as: Data/Device theft Security Risks Lack of Support for device use Lack of employee education around the use of BYOD and safe practices can create more problems BYOD is about employees bringing there own devices so it can be difficult for the Company to support and ensure that the device can run and access data and information correctly over the network

Business owned devices Some business have introduced systems where they will provide employees with mobile devices owned by the company These devices are preferred by the IT Department and are supported by the company IT Department The company might offer different models or devices from a list they are able to support and provide one suitable to each employee depending on their needs The company might have specific software suitable to be used on the devices to help ensure security of company data and information

Another procedure being used around BYOD is to provide a list of mobile devices to employees suitable for BYOD that can be supported by the IT department Then the employees choose to purchase one of the supported devices and can use these personal devices for work

BYOD Policies To protect themselves, many organisations have begun to create policies around the use of BYOD devices and network access for employees. These policies can include information such as: Suitable and unsuitable use: of devices applications or network access Device support: as explained in previous slide some organisations will only offer support to IT approved devices Risk/Liabilities: Such as procedures on informing the company when a device is stolen or missing, rules around the company reserving the right to disconnect or disable devices that breach the organisations policies In the Student Handbook the Computer Usage Policy tells you what is expected of you if you connect a BYOD to any EIT system. If you do not have one of these handbooks, look on www.eit.ac.nz

Security rules or procedures: Such as passwords not being shared; or using Apps that are banned or not to be used on devices when connected to the organisation systems

Videos to watch: BYOD - Duration 3m 6s Our world is changing fast. Workers now collaborate anytime and anywhere, making instant real-time decisions thanks to smart phones, tablets and devices. We're about to rocket past the 1 billion mark of smart devices purchased worldwide, with 80% of workers using personal devices in the workplace. With the new era of Bring Your Own Device, we're seeing the most radical shift in business hardware since PCs invaded the workplace in the 70s. https://www.youtube.com/watch?v=Yq22pRNFHbE&feature=youtu.be

BYOD and the Ethical Problems - Duration 4m 34s As people increasingly bring their own (mostly mobile) devices into the workplace, and use them for both personal and professional activities, new challenges arise—for the employees as well as their employers. In this brief video, Pat Gelsinger, the CEO of VMware, discusses some of the implications of BYOD for data security and personal privacy. Can people enjoy the convenience of BYOD without compromising either the assets of their employers or their own personal privacy?  https://www.youtube.com/watch?v=NvDFV-rsfHA&feature=youtu.be

BYOD Discussion Page - Duration 3m 32s Logicalis brought together a "panel of experts" to talk about why and how to implement a Bring Your Own Device policy, including the technology, cultural implications and policy requirements. Watch the video for five tips on successfully implementing BYOD in your workplace https://www.youtube.com/watch?v=OTCig8TTGEk&feature=youtu.be

BYOD Privacy v Security - When your YouTube video of twerking kittens goes viral, it's a fantastic feeling. When it's your company's trade secrets that go viral, not so much. And that's exactly what can happen when employees use their personal smartphones to transmit and store business data. When that device is lost or stolen, it can cause a data breach. Security vendor Bitglass put together an infographic to illustrate the extent of the problem. http://securitywatch.pcmag.com/privacy/324252-personal-privacy-vs-business-security

Okay, let’s go use the workbook