BYOD Disadvantages and Security Risks PowerPoint PPT Presentation

presentation player overlay
About This Presentation
Transcript and Presenter's Notes

Title: BYOD Disadvantages and Security Risks


1
BYOD Security Risks
  • Presentation by
  • Ravi Namboori
  • Visit us _at_ http//ravinamboori.net

2
BYOD Bring Your Own Device
  • Like all developments in technology, BYOD has its
    fair share of pitfalls.
  • There is a possibility of staff exploiting the
    BYOD environment by going for upgraded phones or
    signing up for maximum data plans. After all,
    these expenses have to be borne by the employers.

3
BYOD - Threats
  • Adopting BYOD can lead to many problems further
    down the road if youre not aware of it properly.
  • Learn Few Risks
  • The threats are forcing security teams to
    introduce new policies to reduce the risk.
    Enforcing them without impacting productivity is
    a balancing act. Experts say the first step is to
    understand the perceived risks and weigh them
    against the company's security posture.

4
Continued...
  • When BYOD was in its nascent stages, companies
    would erase data remotely if a smartphone was
    lost. But people misplace their phones at times,
    so it could lead to problems if critical data is
    wiped off.

5
Developing BYOD Policy..
  • While developing BYOD policy, enterprises need to
    consider the following
  • Segmentation of users and decide on what depth of
    access should be given to each specific segment.
  • What type of devices need to be permitted to
    access corporate data
  • Device specific security policies
  • Need of well-defined service policies
  • Defining use polices

The legal team has to ensure that managers are
properly trained on the BYOD user policy. No
details can be afforded to be given a miss.
6
To Avoid Risks
  • A BYOD workplace is being embraced by companies
    with an effort to make staff more comfortable,
    leading to higher productivity. It would also
    give them flexibility of working from any
    location at any time and on any device of their
    choice.
  • Some companies, however, see some employees
    misusing their devices to play games or to access
    sites not related to their work. Consequently,
    some apps have had to be added to the BYOD
    blacklist.

7
Conclusion
  • Finally we can say instead of banning BYOD enable
    it securely
  • Create a clear policy on BYOD rights and
    information security rules.
  • Train employees to protect work information
    accessed on personal devices.
  • The legal team has to ensure that managers are
    properly trained on the BYOD user policy. No
    details can be afforded to be given a miss.

8
Thanks!!
  • Presentation by
  • Ravi Namboori
  • Visit us _at_ http//ravinamboori.in
Write a Comment
User Comments (0)
About PowerShow.com