Menu Expand
Bring Your Own Device (BYOD)

Bring Your Own Device (BYOD)

(2013)

Additional Information

Book Details

Abstract

The increasing use of personal devices such as smartphones and tablets in the workplace is offering an opportunity as well as a challenge to organisations, in particular the IT department. The potential benefits include increased employee productivity and reduced hardware and software costs to the organisation, but the risks from data leakage and malware are also significant. This ebook looks at ways to embrace the benefits of BYOD while offering advice on how to minimise the risks.
The increasing use of personal devices such as smartphones and tablets in the workplace is offering an opportunity as well as a challenge to organisations, in particular the IT department. The potential benefits include increased employee productivity and reduced hardware and software costs to the organisation, but the risks from data leakage and malware are also significant. By their very nature, mobile devices are more vulnerable to loss or theft. According to Bloomberg BusinessWeek, half of those who found a lost device tried to access corporate networks through remote apps. This ebook looks at ways to embrace the benefits of BYOD while offering advice on how to minimise the risks.

Table of Contents

Section Title Page Action Price
Cover Cover
CONTENTS ii
1 BYOD: THE PROS AND CONS FOR END USERS AND THE BUSINESS 2
2 TECHNOLOGY INNOVATIONS FOR TODAY’S WORKSPACE 4
DO EMPLOYEES ALWAYS WANT TO BRING THEIR OWN? 4
NEW USAGE MODELS IN THE NEW WORKSPACE 5
CONNECTING EVERYTHING TO MAKE OUR LIVES EASIER 6
IT’S ALL ABOUT CHOICE 6
3 A LITTLE CHAT ABOUT BYOD 8
4 TO BYOD OR NOT TO BYOD: THAT IS THE QUESTION 10
5 USER-CENTRIC TECHNOLOGY DEPLOYMENT COMES OF AGE 13
6 NAVIGATING THE CONSUMERISATION OF THE IT STORM 16
A PERFECT STORM FOR IT 16
NAVIGATING THE STORM 17
DEFINING AN ENTERPRISE MDM POLICY 18
7 WHY IT ARE ON THE FRONT LINE OF BUSINESS MANAGEMENT 19
GATEKEEPING ALL THE OPEN DOORS 19
NAVIGATING THE MOBILE WORKFORCE 20
GREATER CHOICE, GREATER RISK 20
WHEN BUSINESS BECOMES PERSONAL 21
GRC: THE LETTERS OF THE LAW 21
MINIMISING RISK, MAXIMISING PRODUCTIVITY 21
8 LEARNING FROM UNIVERSITIES 23
9 PROTECTING DATA IN THE MODERN ENTERPRISE 25
WHAT CAN A CHIEF INFORMATION OFFICER (CIO) DO NOW? 25
MOVING FORWARD 27
10 NEXT-GENERATION SECURITY: MANAGING THE HUMAN FACTOR 28
BORDER CONTROL 28
WHAT DO YOU MEAN BY ‘NEXT-GENERATION’? 29
MOVING RISKS 29
11 EVERYTHING OLD IS NEW AGAIN 31
WE ALREADY KNOW A LOT OF USEFUL PRINCIPLES 31
WE HAVE A GOOD THREAT MODEL FOR MOBILE 31
PRIVACY IS COMPLEX IN THE MOBILE WORLD 32
OUR INTELLECTUAL PROPERTY IS EXPOSED 33
WE MUST CHART TOTALLY NEW TERRITORY 33
CONCLUSION 34
12 GOING INTO REVERSE 35
NOTE 36
13 WHAT DO YOUR APPS KNOW ABOUT YOU? 37
14 DEBATE: BRING YOUR OWN DEVICE 39
Copyright 44