Monday, June 3, 2019
Effect of Bring your own Device (BYOD) on Cybersecurity
Effect of take your feature Device (BYOD) on CybersecurityEffect of Bring your own Device (BYOD) on Cybersecurity at call onplaceIntroductionSeveral new trends in information access ar impacting organizations ability to control and punch naked in corporald selective information. The increase in web applications, cloud computing and Software as a Service (SaaS) offerings, and the Bring Your Own Device (BYOD) phenomenon, means that employees, backing partners and customers are increasingly accessing information using a web browser on a doohickey not owned or managed by the organization (Morrow, 2012). Bring your own device (BYOD) is process whereby when individual/ employees can use personal devices for business purposes (Privacy Right, 2013). And the D in BYOD includes more than just smartph angiotensin-converting enzymes. It also includes employees put down into web applications such as Outlook Web Access and SharePoint, SaaS applications such as CRM systems or healthcare billing applications hosted in cloud services, from home desk point or laptop computers (Morrow, 2012). The concept of bring your own device (BYOD) is a growing trend for business IT. There are a variety of benefits to allowing users to egress their own PCs and mobile devices, but there are also some concerns (Bradley, 2011). Several studies control also shown that BOYD is one the three biggest cybersecurity threat of 2014 (Singh, 2012). In addition, it is suggested that BYOD, or bring your own device, can no longer be thought of as a fad it is quickly becoming the new reality. In addition, as this trend grows, all businesses are potentially at risk which can stem from both internal and external threats, including mismanagement of the device itself, external exercise of software vulnerabilities and the positionment of poorly tested, unreliable business applications (Singh, 2012). In this study, the effect of Bring your own Device (BYOD) on Cybersecurity at workplace will be in vestigated. surmiseIt might be concluded that due to using of unauthorized devices such as personal electronic device also known as Bring Your Own Device (BYOD) at workplaces causes intrusion into the company net income, thereby causing data loss, stolen intellectual property to mention but few.Arriving at this hypothesis It was not an easy task, however, following the provided information made it easier. Coming up with the hypothesis, I had to brainstorm and do enough research to come up with a established sketch of the variables (independent and dependent) involved in this issue. To ensure the hypothesis is an empirical statement, general phenomenon, plausible, specific, consistent and testable. In this hypothesis, the identified independent variable is the personal electronic device (BYOD) while the dependable variable is the network intrusion, thereby causing data loss, stolen intellectual property.Figure 1 Schematic sketch of identified variablesIndependent variable quantity Dependent Variable Use of Personal Electronic Device Network intrusionFigure 1 showing the dependable and independent variables of the hypothesis FindingsStudies have shown that one of the biggest challenges for organizations when employees use their own device organizations is that corporate data is being delivered to devices that are not managed by the IT department (Morrow, 2012). This has security implications for data leakage, data stealing and regulatory compliance (Morrow, 2012).in addition, the use of unmanaged devices such as BYOD causes enterprises to have less control and visibility, and fewer mitigation options than they do with managed devices (Morrow, 2012). In addition, Laptops, smartphones and tablets that connect to corporate networks importantly increase threats to subtle data (Morrow, 2012). . Organizations should be concerned about the security state of expiry devices and the risks to which they are exposed. Key loggers, malware and cyber-attacks have greatl y increased the potential for unauthorized access to, and information theft from, endpoints. Potential unintended consequences such as data leakage and malware reinforce the need to raise the security of corporate data. A malicious employee can easily steal company trade secrets, intellectual property or sensitive customer information by salvage it locally or to a cloud service, sending it through accounts in Dropbox and you send it or emailing it via a personal webmail account. Organizations must control the data afterwards its delivered to the device to prevent accidental or intentional loss by careless or malicious end users.Studies have also shown that to assess the risks of BYOD computing, everything from data contamination to user habits to the activities of criminal syndicates needs to be considered (Romer, 2014). Some of the security risks to be considered includesSecurity as an afterthought Shows that most(prenominal) mobile devices either miss advanced security feat ures or have them disabled by default. Even basic features such as screen locks are turned off, and most users allow for them that way (Romer, 2014).Data contamination Shows the photos and other content share storage space along with confidential business data. This combining of data introduces new risks to the enterprise. by carelessly configured back-ups or file copies, personal content might accidentally end up on corporate file servers. Worse, personal files that suppress malware might spread to business files and from the mobile device to internal file servers and other enterprise assets (Romer, 2014).New Forms off malware Shows that New forms of malware targeting mobile devices are on the rise. IBM predicts that mobile malware will grow 15% annually for the next few years (Romer, 2014). Hackers and criminal syndicates realize that most mobile devices are less secure than more traditional devices such as laptops (Romer, 2014). They have begun targeting mobile devices for att acks ranging from mischievous pranks to advanced persistent threats that stealthily copy internal data over galore(postnominal) months, transmitting it to remote control centers around the world (Romer, 2014).Phishing attacks that slip past network defenses Shows that many employees routinely catch up on email and work during evenings and weekends, and when they do, they typically use smartphones or tablets (Romer, 2014). Realizing that most of these devices lack AV software and that most email and web traffic accessed remotely bypasses inspection by firewalls and gateways, attackers are now designing phishing attacks and other email exploits to be triggered during non-business hours (Romer, 2014).Lost Devices Shows that on average, a cellphone is lost in the US every 3.5 seconds.1 Even if a lost smartphone or tablet does not contain confidential data, it still might include apps or cached credentials that make it easier for criminals to infiltrate an enterprise network (Romer, 20 14). As workers begin carrying more devices, the likelihood of them losing devices only increases (Romer, 2014).Risky file sharing shows that to ensure all their devices have the files they need, employees often try out one or more file-sharing services, including free but risky file-sharing apps that run on public clouds (Romer, 2014). Unfortunately, these services, though popular, are usually not secure enough to be trusted with enterprise data (Romer, 2014).Conclusions with recommendationsOverall, this study shows that organizations should be concerned about the security state of endpoint devices and the risks to which they are exposed. In addition, key loggers, malware and cyber-attacks have greatly increased the potential for unauthorized access to, and information theft from, endpoints. Potential unintended consequences such as data leakage and malware reinforce the need to enhance the security of corporate data. In addition, to protect valuable information such as intellect ual property, organizations need to make data security a top priority. To counter these sophisticated threats, organizations should employ a layered security strategy that provides necessary access to corporate information while minimizing risk and maintaining compliance (Privacy Right, 2013). When it comes to sensitive information, the focus must go beyond authorized and unauthorized users and extend data protection from storage through transport to delivery on the endpoint to prevent sensitive data loss (Privacy Right, 2013). Organizations also need to stop making a distinction between devices in the corporate network and devices external of it, and focus instead on protecting their information (Privacy Right, 2013). They must compartmentalize access to sensitive information, employ better audit logging and log analysis, and deploy security solutions that are designed to support current BYOD strategies, such as those that can control the replication of data (Privacy Right, 2013). In conclusion, organizations must now readdress their corporate policies to ensure that their greatest asset information is being safeguarded on these mobile devices that are outside of their direct control (Gatewood, 2012).ReferencesSingh, Niharika. B.Y.O.D. Genie Is Out Of the Bottle morning star Or AngelJournal of Business Management Social Sciences Research (JBMSSR)ISSN No 2319-5614 Volume 1, No.3, December 2012Bradley, Tony. Pros and Cons of Bringing Your Own Device to Work. PCWorld. PCWorld, 21 Dec. 2011. Web. 17 Dec. 2016.Privacy Right. Bring Your Own Device (BYOD) . . . at Your Own Risk Privacy Rights Clearinghouse.Privacy Rights Clearinghouse, 1 Sept. 2013. Web. 17 Dec. 2016. .Morrow, B.BYOD security challenges Control and protect your most sensitive data(2012)Network Security, 2012 (12), pp. 5-8.Romer, Hormazd. Best Practices for BYOD Security.Computer Fraud Security 2014.1 (2014) 13-15. Web. 17 Dec. 2016.Gatewood, Brent. The nuts and bolts of making BYOD work. Info rmation Management Journal, Nov.-Dec. 2012, p. 26+. Academic OneFile, Accessed 17 Dec. 2016.
Subscribe to:
Post Comments (Atom)
No comments:
Post a Comment
Note: Only a member of this blog may post a comment.