Bring Your Own Device Paper

1772 Words4 Pages

Cybersecurity Vulnerability Posed by Bring Your Own Device (BYOD)

To understand the jargon used in the study of IT security, it is important to differentiate two terms that often get used interchangeably – vulnerability and threat. According to the Threat Analysis Group, a company that provides objective and independent security advice, a threat is anything that can exploit a vulnerability, intentionally or accidentally, and obtain, damage or destroy an asset, while a vulnerability is a weakness or gap in a security program that can be exploited by threats to gain unauthorized access to an asset. Threats include spyware, malware, adware companies, organized crime, and disgruntled internal employees, all of which are also referred to as …show more content…

Centralization and management of data using mainframe and minicomputers were diminished. Yet, during those times, organizations still retained tight control over the computing devices their employees could use. However, around the turn of the millennium, computers became more affordable, mobile, and connected. Additionally, home computers became increasingly used for after office hours’ work (McLellan, 2013). As more and more employees bring their own devices (smartphones, tablets, laptops) to work to connect to the corporate network, organizations started adopting a Bring Your Own Device (BYOD) policy. This policy, although has some merits in offering organizations benefits in terms of costs, employee satisfaction, productivity, and innovation, also exposes the organizations to security vulnerabilities and loss of sensitive information due to the use of personal devices in the …show more content…

Employees prefer to use their own smartphones, tablets and laptops which they have chosen and invested in, as opposed to the ones selected for them by IT. Additionally, using the same devices for work and for personal purposes also relieves employees the burden of carrying multiple devices anywhere they go, which boosts employee mobility. According to Deloitte’s The Connected Workplace report, 83% of skilled workers with “access to flexible IT policies said they were satisfied with their work, compared with 62% of their counterparts who didn’t get to enjoy flexible IT conditions” (Lui, 2013). Flexible IT policies included those of BYOD and

Open Document