+1(316)4441378

+44-141-628-6690

Any topic (writer’s choice)

Please respond to the following: 1-2 paragraphs. Then respond in one paragraph to the additional post.

Your company is exploring the possibility of allowing employees to use their own mobile devices for their work and connect to the internal company network. In your role as the CSO, the CEO has asked you to brief her on what steps can be taken to implement a BYOD policy while reducing the overall risk to the organization as much as possible.

Write your talking points for the CEO, including the associated risks with BYOD, potential security countermeasures, and your initial thoughts on how you would test their implementation to assess the overall risk level. This can be in paragraph form or a bulleted list of your talking points.

Once that section is completed, respond in one paragraph to the post below. State if you agree or disagree and the reasoning why. You may also add on to the conversation.

Post:

While BYOD is becoming more commonplace in the workforce, there are risks in using your own device.

Because the employee is using their own device, it is possible for the employee to download malware that could potentially create a risk for company information that is stored on the device. This can helped with proper training for employees on how to spot malware and viruses, along with training on how to safely browse and use antivirus software.

Data theft is another issue to be concerned about. Public Wi-Fi networks could allow attackers to gain access to the employees system and steal their data. While an employee may have to use public Wi-Fi from time to time depending on circumstances, employees should deter from doing so. Employees should also use the companies VPN for an extra layer of security while using public Wi-Fi.

Employees need to be trained on using their own device for business so they do not make mistakes that could cause issues with BYOD. Ranging from email security, to network security, it is important for employees to understand how to properly use their device.

And lastly, device loss or theft. A lost or stolen device could cause a major security issue for the company. To prevent this, an encryption software that can wipe the device if unauthorized access is attempted too many times can be installed to protect the device.

 

You can place an order similar to this with us. You are assured of an authentic custom paper delivered within the given deadline besides our 24/7 customer support all through.

 

Latest completed orders:

# topic title discipline academic level pages delivered
6
Writer's choice
Business
University
2
1 hour 32 min
7
Wise Approach to
Philosophy
College
2
2 hours 19 min
8
1980's and 1990
History
College
3
2 hours 20 min
9
pick the best topic
Finance
School
2
2 hours 27 min
10
finance for leisure
Finance
University
12
2 hours 36 min
[order_calculator]