Aspects of Bring Your Own Device Policies

Subject: Management
Pages: 1
Words: 347
Reading time:
2 min
Study level: College

Bring Your Own Device (BYOD) policies have undoubtedly increased the danger of internal threats to corporations. The dissatisfied worker on the verge of leaving is perhaps the most hazardous individual a firm can have. Such a person has network and data access. They also have additional options to connect to the network and share information thanks to BYOD (Kaneshige par. 5). The reputation of a company may be seriously harmed if a security breach via a worker’s device results in the exposure of critical information about clients or corporate partners.

Mobile devices provide an entry point into a company’s data. BYOD poses several security problems from a pure security standpoint. Employees are getting more lenient with the sort of private data they carry home from work; whether it is a list of clients’ credit card details or code editors that companies rely on to maintain a competitive advantage in the market. Once employees return home, sensitive corporate details may be shared across several devices and platforms (Kaneshige par. 13). Given the increasing prevalence of mobile technology, top management in information systems should aim to tackle arising security threats.

Policy initiatives should be incorporated into a company’s BYOD policy to improve security. Firstly, the majority of restrictions should be adjusted to outline the numerous locations where employees use a company’s sensitive information on their devices, including at home, the channels via which data can move, and the various forms of interaction that will happen, such as Facebook, Instagram, and emails. Secondly, businesses should ensure that data protection is not merely a component of their entire human resource policy, but also their yearly performance review (Bailletteet al. 79). Thirdly, companies may dramatically minimize security risks by restricting the sorts of devices used for work purposes by personnel. Fourthly, corporations should guarantee that hardware and software are improved regularly and conduct audits of staff devices. Fifthly, workers should receive continuous security training (Lee Jr et al. 312). Employees can benefit from smartphone security training sessions that educate them about existing dangers and how to protect their devices from illegal access.

Works Cited

Baillette, Paméla, et al. “Bring Your Own Device in Organizations: Extending the Reversed IT Adoption Logic to Security Paradoxes for CEOs and End Users.” International Journal of Information Management, vol. 43, 2018, pp. 76-84.

Kaneshige, Tom. “The BYOD Mobile Security Threat Is Real.” Computerworld, 2013. Web.

Lee Jr, James, et al. “Implications of Monitoring Mechanisms on Bring Your Own Device Adoption.” Journal of Computer Information Systems, vol. 57, no. 4, 2017, pp. 309-318.