Introduction
The constantly increasing portability, and plummeting prices of
powerful mobile computing devices have popularized a trend known as
BYOT (Bring your own technology) policies, also known as BYOD(bring
your own device), and in some quarters as BYOP (bring your own phone)
[1]. While the trend has been around in one form or the other in the
past two decades, it has seen a rapid adoption in recent times (Figure
1), [2, 5], and has had a significant impact on several industries. A
recent study carried out by Cisco indicated that eighty nine percent
of IT departments enable BYOT in some form, and sixty nine percent of
IT leaders are “positive” about BYOT [36]. A press release made by
Gartner in 2013 foresees a future in which BYOT practices will not
only be permitted, but required for most enterprises. Dell and VMware
corroborate this report [5, 6, and 7]. However as is common in the
computing arena, new trends often bring with them their own security
issues. While some companies feel the phenomenon is just a passing
fad, there is substantial evidence that indicates otherwise (Figure 2)
[3], and therefore organizations must implement effective strategies
to identify and mitigate the threats posed by the aforementioned
security issues.
In the following sections, the author will aim to provide a clear
understanding of what implementing BYOT policies encompass, their
impact on productivity in enterprise environments, and the security
issues associated with them.
Figure 1. Growth of employee owned devices. [37]
Figure 2 Shift to personnel owned devices in the workplace. [38]
What is BYOT?
BYOT can be described as the practice...
... middle of paper ...
...ons-Global.pdf [Accessed 07 Dec 2013]
[37]Citrix. IT Organizations Embrace Bring-Your-Own Devices: Global BYO Index 2013 [Online] Available from: http://www.citrix.com/content/dam/citrix/en_us/documents/products-solutions/it-organizations-embrace-bring-your-own-devices.pdf [Accessed 07 Dec 2013]
[38] Mark Bowker. The Enterprise Strategy Group. The VMware Mobile Secure Workplace 2013 [Online] Available from: [Accessed 07 Dec 2013]
[39] Kevin Johnson and Tony DeLaGrange. SANS Institute. SANS Survey on Mobility/BYOD Security Policies and Practices 2012 [Online] Available from: http://www.sans.org/reading-room/analysts-program/SANS-survey-mobility [Accessed 07 Dec 2013]
[40] Ponemon. 2013 State of the Endpoint 2012. [Online] Available from: http://www.ponemon.org/local/upload/file/2013%20State%20of%20Endpoint%20Security%20WP_FINAL4.pdf p6. [Accessed 01 Dec 2013]
In recent times the in the UK we have seen the more frequent use of
accepted practice today by many, and since it was less common in 1948, some became enraged
Program on Telecommunications and Cybersecurity Policy. (n.d.). The Global Information Society Project Program for Telecommunications Policy. Retrieved November 11, 2013, from http://www.telecom-program.org/
my belief that it had started in the late 50’s but it was catalysed by
Works Cited for: Caplan, Hayley. How to Avoid Cell Phone Identity Theft? What Is Privacy? N.p., 31 July 2012. Web.
more common. These changes in society between now and the 1970s, however, has given more
Roberts, Richard M. "Network Secrurity." Networking Fundamentals. 2nd ed. Tinley Park, IL: Goodheart-Willcox, 2005. 599-639. Print.
when did this trend actually begin? I do not believe there is any clear answer
As we progress deeper into the digital era, we rely more and more on our electronic devices. Over the last decade, almost everyone who lives in a developed nation owns a cellphone and they are becoming an integral part of our life.
5. The thing that you will need to implement is the disabling of all unnecessary ports and services on the POS devices.
of a sort were introduced around this time, though not in the manner we are
In this case study, I aim to present the recent issue about Cyber security, protecting client’s private data and information through the controversial Apple and
Many people in today’s society rely on technology to help us with our daily lives and help us stay connected to family, friends, and other people. The advancements in today’s cell phone technology is very complex and made to be efficient for their owners, allowing them to surf the net and IM message people instantly. Cellphones in particular have developed very fast in the past 15 years. From my childhood, cell phones have evolved from the old school Nokia bricks that allowed texts, calls, and simple graphic games, to todays I-Phones that have higher computable capabilities than some computers. In the United States alone, there is an estimated population of around 297 million people, and 197 million people are subscribed to cell phone companies (Starr). With so many people in today’s society with so much power and opportunity in the palm of their hands, we shouldn’t forget that “With great power comes great responsibility” –Voltaire.
many varieties than before and some we may not approve of, but today a solid link between
Since the invention of the cell phones, in 1973, it has quickly become the most popular device used especially today during the twenty-first century. Due to its hands-free-easy-to-use design, the amount of people that own a cell phone is rapidly increasing. The useful text messaging feature has proved to be extremely useful in current times. Along with these helpful features, the cell phone is easily accessible and more portable. The majority of phone companies offer a 3G or 4G data plan, meaning internet access can be found on your phone almost anywhere, at any time. In addition to its easy portability, the cell phone is a very useful and helpful device, allowing one to stay connected to the outer world. “With a smartphone, you can connect to the Web from virtually anywhere. You ...