BOOK
Bring Your Own Device (BYOD)
(2013)
Additional Information
Book Details
Abstract
The increasing use of personal devices such as smartphones and tablets in the workplace is offering an opportunity as well as a challenge to organisations, in particular the IT department. The potential benefits include increased employee productivity and reduced hardware and software costs to the organisation, but the risks from data leakage and malware are also significant. This ebook looks at ways to embrace the benefits of BYOD while offering advice on how to minimise the risks.
The increasing use of personal devices such as smartphones and tablets in the workplace is offering an opportunity as well as a challenge to organisations, in particular the IT department. The potential benefits include increased employee productivity and reduced hardware and software costs to the organisation, but the risks from data leakage and malware are also significant. By their very nature, mobile devices are more vulnerable to loss or theft. According to Bloomberg BusinessWeek, half of those who found a lost device tried to access corporate networks through remote apps. This ebook looks at ways to embrace the benefits of BYOD while offering advice on how to minimise the risks.
Table of Contents
Section Title | Page | Action | Price |
---|---|---|---|
Cover | Cover | ||
CONTENTS | ii | ||
1 BYOD: THE PROS AND CONS FOR END USERS AND THE BUSINESS | 2 | ||
2 TECHNOLOGY INNOVATIONS FOR TODAY’S WORKSPACE | 4 | ||
DO EMPLOYEES ALWAYS WANT TO BRING THEIR OWN? | 4 | ||
NEW USAGE MODELS IN THE NEW WORKSPACE | 5 | ||
CONNECTING EVERYTHING TO MAKE OUR LIVES EASIER | 6 | ||
IT’S ALL ABOUT CHOICE | 6 | ||
3 A LITTLE CHAT ABOUT BYOD | 8 | ||
4 TO BYOD OR NOT TO BYOD: THAT IS THE QUESTION | 10 | ||
5 USER-CENTRIC TECHNOLOGY DEPLOYMENT COMES OF AGE | 13 | ||
6 NAVIGATING THE CONSUMERISATION OF THE IT STORM | 16 | ||
A PERFECT STORM FOR IT | 16 | ||
NAVIGATING THE STORM | 17 | ||
DEFINING AN ENTERPRISE MDM POLICY | 18 | ||
7 WHY IT ARE ON THE FRONT LINE OF BUSINESS MANAGEMENT | 19 | ||
GATEKEEPING ALL THE OPEN DOORS | 19 | ||
NAVIGATING THE MOBILE WORKFORCE | 20 | ||
GREATER CHOICE, GREATER RISK | 20 | ||
WHEN BUSINESS BECOMES PERSONAL | 21 | ||
GRC: THE LETTERS OF THE LAW | 21 | ||
MINIMISING RISK, MAXIMISING PRODUCTIVITY | 21 | ||
8 LEARNING FROM UNIVERSITIES | 23 | ||
9 PROTECTING DATA IN THE MODERN ENTERPRISE | 25 | ||
WHAT CAN A CHIEF INFORMATION OFFICER (CIO) DO NOW? | 25 | ||
MOVING FORWARD | 27 | ||
10 NEXT-GENERATION SECURITY: MANAGING THE HUMAN FACTOR | 28 | ||
BORDER CONTROL | 28 | ||
WHAT DO YOU MEAN BY ‘NEXT-GENERATION’? | 29 | ||
MOVING RISKS | 29 | ||
11 EVERYTHING OLD IS NEW AGAIN | 31 | ||
WE ALREADY KNOW A LOT OF USEFUL PRINCIPLES | 31 | ||
WE HAVE A GOOD THREAT MODEL FOR MOBILE | 31 | ||
PRIVACY IS COMPLEX IN THE MOBILE WORLD | 32 | ||
OUR INTELLECTUAL PROPERTY IS EXPOSED | 33 | ||
WE MUST CHART TOTALLY NEW TERRITORY | 33 | ||
CONCLUSION | 34 | ||
12 GOING INTO REVERSE | 35 | ||
NOTE | 36 | ||
13 WHAT DO YOUR APPS KNOW ABOUT YOU? | 37 | ||
14 DEBATE: BRING YOUR OWN DEVICE | 39 | ||
Copyright | 44 |