byod - bring your own device

2

Click here to load reader

Upload: rihab-chebbah

Post on 13-Apr-2017

21 views

Category:

Technology


1 download

TRANSCRIPT

Page 1: BYOD - Bring Your Own Device

BYOD - Bring Your Own Device

Rihab CHEBBAH

20 January 2017

Abstract

With our increasingly connected lifestyle, the BYOD technology has been deeply in-

volved in society. It refers to the use of personnal equipement in a professional context.

These personal equipements will contain valuable data from our digital life; emails, con-

tacts, photos, videos, text messages ;in other words, important personal and business

information. Therefor, the informations are extremely exposed to the risk of theft.

How to avoid loss of data but also their fraudulent use?

BYOD technology

BYOD is the abbreviation of "Bring YourOwn Decive". Companies around the wordallows their employees to bring their personalequipements to work and connect to the com-panies resources. That way, they can workwith their personal computer, can save basedinformation on their personal phone or eitherhave access from their home.

Now, BYOD is not just walking around theo�ce with your personal devices, it has a lotmore applictions for the organisation workingcrosses.The main process of BYOD, is the productiv-ity and the satisfaction in work increase. thisis due to the fact that using the own devicesand applications make the workers feel moreconfortable. also thet can work with more �ex-ibility choosing when and where since their de-vices with them constantly. the company alsosaves a lot of money in technologies resources.

However, the main disadvantage of BYODis security. The companies information is ina risk. For example, if the employee looses hisphone , this requires a big maintain in the con-trol from the IT department and a bigger costof web data.to avoid this, it's a imoortant to have a MobileDevice Management(MDM). This program al-lows you to garante the security of information.You can either use a systematic protection ofthe smartphone with a password or a geoloca-tion application and furthermore you can use abackup solution for your smartphone that syn-chronises �les, passwords, e-mails, contacts ...

Secure digital information

There are speci�c methods to protect digitalinformation from theft or criminal use.

Systematic protection with a pass-

word

Do not protect your phone with a password isirresponsible, especially when it contains pro-fessional information. The password must belong (8 characters preferably, with numbers,letters, but also symbols. Also, we need to getsure that the phone locks automatically whenit isn't in use.Passwords can't be just a set of characters.

1

Page 2: BYOD - Bring Your Own Device

There are also the Fingerprint identi�cationand Eyeprint identi�cation.

Geolocation application

In the event of loss or theft of the smartphone,many applications allow it to remotely track,lock and erase the contents of the phone be-fore a criminal can access and use sensitive orpersonal data.However, some applications only work if theyare installed on the phone beforehand. Man-ufacturers like Apple, Samsung and Microsofto�er Smartphone localization applications.The use of applications developed by thirdparties is also possible, but caution must betaken, it is necessary to verify the credibilityof the source.

Backup solution

The two previous steps may discourage crim-inal use of the data, but only this step canrestore the entire contents of the phone.A smartphone backup solution saves photos,videos, contacts, events, reminders and mes-sages and restores data to a new device. Whenyou �rst save your smartphone, all your datais saved in the Cloud. After this �rst backup,only data that has been modi�ed or addedwill be automatically saved. All backups areperformed in the background to prevent theparallel use of the smartphone.

2