BBB Technology and Computers Connection Group Presented by: Cary M. Root Root-InfoTech.com.

Slides:



Advertisements
Similar presentations
IT Security Policy Framework
Advertisements

Tiffany Phillips CIS What is a Social Networking Website? Social networking websites function like an online community of internet users. Depending.
Speaker Name, Title Windows 8 Pro: For Small Business.
Mobile device security Practical advice on how to keep your mobile device and the data on it safe.
BRING YOUR OWN DEVICE Presenter: Rachelle R. Green Duffy & Sweeney, Ltd.
INADEQUATE SECURITY POLICIES Each covered entity and business associate must have written polices that cover all the Required and Addressable HIPAA standards.
BYOD: The Corporate Dilemma Seeking an Approach Virtuous Insights Consulting Services Aug 2012 Virtuous Insights © Virtuous Insights Consulting.
Cloud Computing EDT Cloud Computing Overview Cloud Computing can be defined as a network of applications, services, and infrastructure that are.
Jisc Legal. John X Kelly - Mobile Devices - BYOD.
Bring Your Own Device (BYOD) Understanding BYOD June 27, 2013 © 2013 AT&T Intellectual Property. All rights reserved. AT&T and the AT&T logo are trademarks.
Invasion of Smart Phones in Clinical Areas Chrissy Kyak Privacy Officer University of Maryland Upper Chesapeake Health.
BYOD Guidelines Crosswell Elementary. Definition of Device For purposes of BYOD, “Device” means a privately owned portable electronic device. That includes,
© 2012 Citrix | Confidential – Do Not Distribute BYOD Champion Presentation CIO How-To Kit: Bring-Your-Own Devices © 2014.
1 3M Privacy Filters Justification Toolkit: How to Use The following presentation is meant to provide you with the most impactful data points to help you.
What’s Next What We believe Who We Are Cloud Computing Big data Mobility Social Enterprise.
Impact of Mobile Technology Tim Nesler CIO and Associate VP for Information Technology Services Santa Fe College League for Innovation 2011 CIO Summit.
SAM for Mobile Device Management Presenter Name. of employees spend at least some portion of their time working outside their office. Mobility is the.
1 Construction Engineering 221 Construction Insurance.
CHAPTER Section 16.1 Legal Issues Section 16.2 Insurance Protecting Your Business.
Buying Process There are many good reasons for you to buy a home, wealth building ranks among the top of the list. There are solid financial reasons.
Welcome to BYOT PD Informational Training By: Mr. Kirkpatrick & Mr. Saintvilus.
Information Age In Which We Live Session 2. Introduction Knowledge is Power What you don’t know will hurt you Business are using information to reel in.
© 2009 by The McGraw-Hill Companies, Inc. All rights reserved. McGraw-Hill Career Education Computers in the Medical Office Chapter 2: Information Technology.
Should We Believe the Hype? Stephen Fast Lead, Cyber Innovation Strategy Cyber Innovation Division Applied Research Laboratory The Pennsylvania State University.
MOBILE DEVICE SECURITY. WHAT IS MOBILE DEVICE SECURITY? Mobile Devices  Smartphones  Laptops  Tablets  USB Memory  Portable Media Player  Handheld.
MobeSys Technologies MobeSys – helping you overcome mobile technology challenges.
Eric J. Pritchard One Liberty Place, 46 th Floor 1650 Market Street Philadelphia, Pennsylvania (215)
Chapter 13 Security Permission granted to reproduce for educational use only.© Goodheart-Willcox Co., Inc. Objectives State the major responsibility.
What If You Could… …Automatically protect and secure your company’s most critical business information?... …Get more done with less by enabling employees.
Lecture 6: Cloud Computing By D. Najla Al-Nabhan 1.
Confidential The Power to Connect. On-the-go presentations in client’s office and outside meeting locations are made professional and worry free. CircleMobile.
BRING YOUR OWN DEVICE. BYOD AND THE IMPACT ON IT SECURITY BYOD and pressure employees put on IT organization to supply or allow consumer mobility devices.
Security Professional Services. Security Assessments Vulnerability Assessment IT Security Assessment Firewall Migration Custom Professional Security Services.
Security considerations for mobile devices in GoRTT
 INADEQUATE SECURITY POLICIES ›Each covered entity and business associate must have written polices that cover all the Required and Addressable HIPAA.
BYOD Smackdown Presenters Roy Hickman, Moderator David Palme, Con Stance Jeff Trudell, Pro Stance.
BYOD-Data collection. Bring your own device From Wikipedia Bring your own device (BYOD) (also called bring your own technology (BYOT), bring your own.
© 2012-Robert G Parker May 24, 2012 Page: 1 © 2012-Robert G Parker May 24, 2012 Page: 1 © 2012-Robert G Parker May 24, 2012 Page: 1 © 2012-Robert G Parker.
Nico Malancea, IST Main point:  Employees using their own smartphones would allow companies to enjoy all of the same benefits of a mobile workforce.
SAM for Virtualizatio n Presenter Name. Virtualization: a key priority for business decision makers Technavio forecasts that the global virtualization.
Mobility In the Enterprise Friend or Foe? Bob West, CEO, Echelon One 2012 Workshop on Cyber Security and Global Affairs 20 Junio, 2012 Barcelona, España.
Data Security in a Mobile World Emmitt Wells – Getronics.
Bring Your Own Device in HCPSS. What is BYOD? BYOD stands for Bring Your Own Device Students and staff are welcome to bring their personal devices such.
Cloud Computing Project By:Jessica, Fadiah, and Bill.
Chapter 37 The Fundamentals of Risk. Risk Risk - can be thought of as the possibility of incurring a loss. There are 4 main types of Risk -  Economic.
COMP1321 Digital Infrastructure Richard Henson University of Worcester December 2012.
Chris Apgar, CISSP President, Apgar & Associates, LLC December 12, 2007.
Restaurant 1. 2 There are several different types of restaurant classifications, including: Family Style Fine Dining Fast Food Buffet.
LEGAL AND MORAL ISSUES – CODE OF CONDUCT Year 13.
Cyber Security in the Mobile Era KEEPING ENTERPRISE DATA SAFE IN THE BYOD ERA.
BYOD: An IT Security Perspective. What is BYOD? Bring your own device - refers to the policy of permitting employees to bring personally owned mobile.
Office 365 is cloud- based productivity, hosted by Microsoft. Business-class Gain large, 50GB mailboxes that can send messages up to 25MB in size,
Šarūnas Končius Technology Strategist of Microsoft Microsoft Lithuania.
Moving to BYOD Gary Audin 1.
3 REASONS WHY TIME CLOCK SOFTWARE CAN BOOST YOUR PROFITS In this unstable economy, most business organizations are ready to embrace whatever legal cost-cutting.
Mobile device security Practical advice on how to keep your mobile device and the data on it safe.
In today’s world Smartphone are the most required tool in our life. They are like small computers in our palm.
1 Forrester Mobile Workforce Adoption Trends; 2 Pivoting SMBs to Buy PCs; Techaisle, 2015; 3 Estimated based on Windows* 8.1 Local HD Video Playback Power,
THE CONSUMERIZATION OF IT By Patricia Coonelly, Anthony Dipoalo, Tom Stagliano.
Workshifting Transform your business – empower your people.
Retail & Service 1. 2 The Retail & Service industry encompasses a wide variety of businesses. This segment includes: Businesses engaged in selling goods.
Total Enterprise Mobility Comprehensive Management and Security
0 Employee Benefits Group Health Insurance – Self-Funded.
BYOD Security Risks Presentation by Ravi Namboori Visit
Mobile Devices, BYOD, and the Workforce: Responsible Mobile Computing,
Impact of IT Consumerisation on Enterprise Security
BYOD at Combs Elementary
Digital Citizenship and Social Media
Introduction to BYOD EIT, Author Gay Robertson, 2017.
Securely run and grow your business
Presentation transcript:

BBB Technology and Computers Connection Group Presented by: Cary M. Root Root-InfoTech.com

 Bring your own device  Also referred to as:  Bring your own technology (BYOT)  Bring your own phone (BYOP)  Bring your own PC (BYOPC)  Terms that are frequently used to describe the policy of permitting employees to bring personally owned mobile devices (laptops, tablets, and smart phones) to their place of work  And use those devices to access privileged company information and applications

BusinessEmployees ProsA business that adopts a BYOD policy allows itself to save money on high-priced devices that it would normally be required to purchase for its employees. Employees may take better care of devices that they view as their own property. Companies can take advantage of newer technology faster. Employees who work for a business with a BYOD policy are able to decide on the technology that they wish to use for work rather than being assigned a company device. This is thought to improve morale and productivity. Exclusive control of features is given to the employee. ConsCompany information will often not be as secure as it would be on a device exclusively controlled by the company. (Security professionals have termed it 'Bring Your Own Danger' and 'Bring Your Own Disaster') The company may have to pay for employee devices' phone service, which they use outside company time. Due to security issues, the employees often do not have true full control over their devices, as the company they work for would need to ensure that proprietary and private information is secure at all times. It is an out-of-pocket expense for the employees. They would be responsible for repairs if their devices were damaged or broken at work. Businesses that fall under compliancy rules such as PCI or HIPAA must still comply when using BYOD.

A message for IT pros about BYOD: Resistance is futile!

#1  Staff May Not Be Onboard  One thing that every BYOD advocate assumes is that all employees are digitally or tech minded.  The reality is that some employees may actually prefer archaic technology.  On top of that, they might even believe that older tech is more efficient.  They also might not be excited about having to buy their own laptop or tablet PC. This is where many BYOD policies come up short.

#2  It May Not Cut Costs Significantly  This is a hotly debated component of BYOD implementation  Some people say that BYOD cuts costs by shifting buying power to employees  Other people believe that BYOD policies completely overlook the financial strain such a program would put on the IT department

#3  It Can Complicate Things for the IT Department  Outside of the financial strain BYOD may or may not put on an IT department, there is the obvious concern of logistical problems that may arise  Some companies require their employees to handle all IT logistics  7 out of 10 companies surveyed would still provide ongoing support for employee-purchased mobile devices

#4  Could Lead to Employee Feuds  This seems silly, but implementing a BYOD policy may induce employee feuding  As more affluent employees purchase top-of-the-line laptops, tablets and smartphones, other employees may become jealous of their productivity and flashy new gadgets

#5  Concerns Over Intellectual Property  The most pressing concern for businesses may be the security of intellectual property  When someone leaves the company, there is no way to guarantee that trade secrets and confidential company information will not be stolen  Companies would need to invest in remote wipe services to protect their IP

#6  Puts Tech Purchasing Power in the Hands of Employees  One of the greatest defenses of the BYOD revolution is that it cuts costs by shifting buying power from the company to the employee  It allows company employees to buy and use the devices they love, and it doesn’t cost the company a dime in purchasing costs

#7  Allows for High Levels of Flexibility  Many companies have stringent rules relating to employee use of computing devices  In many cases, employees are not allowed to take mobile devices out of the work facility

#8  Potential Data Retention Problems  In addition to security risks, unmonitored mobile devices pose the threat of data loss  Protecting against this involves increasing IT support to ensure high levels of data retention throughout the IT infrastructure

#9  Serves as a Great Teaching Tool  New mobile tech has done wonders for interactive learning at all levels  Employee-owned tablet PCs and laptops can be used to give presentations from anywhere in the office

#10  High Levels of Worker Satisfaction  Employees who use their own devices often experience more satisfaction with their work  They can feel comfortable in delivering high-caliber work with their own computing tools

#11  Data is Discoverable  Everything an employee does on her personal iPhone, for example, could be used as evidence in a lawsuit against her employer  Employees who assume they have a right to privacy -- it's "my" device, after all -- might likewise be in for a shock  The personal devices they use at work could be examined not only by their employer but by the other party in the lawsuit

#12  Discovery Can Be Expensive  If employees are using not just one but two or more personal devices for work, you're potentially adding a multiplier to your legal costs in a lawsuit  That's because all of those devices might have to be turned over for discovery  In fact, there doesn't even need to be a lawsuit to incur such costs -- just the threat of one and a requirement for litigation hold

BBB Technology and Computers Connection Group