SlideShare a Scribd company logo
1 of 23
Download to read offline
Turn	
  BYOD	
  into	
  a	
  Business	
  
Asset	
  
BYOD	
  =	
  Bring	
  Your	
  Own	
  Device	
  =	
  employees	
  use	
  their	
  own	
  
personal	
  electronic	
  devices	
  in	
  the	
  workplace.	
  
	
  	
  
	
  
	
  
IntroducCon:	
  New	
  trend	
  brings	
  business	
  perks	
  

Businesses	
  are	
  beginning	
  to	
  assess	
  the	
  benefits	
  of	
  BYOD:	
  
	
  
-­‐  increased	
  flexibility	
  and	
  responsiveness	
  from	
  employees	
  who	
  remain	
  connected	
  to	
  
work	
  regardless	
  of	
  their	
  locaCon	
  
	
  
-­‐  employees	
  are	
  more	
  producCve	
  using	
  their	
  own	
  familiar—and	
  oEen	
  faster—devices	
  
	
  
-­‐	
  	
  	
  	
  hardware	
  savings	
  since	
  the	
  purchase,	
  maintenance,	
  management,	
  and	
  accessories	
  for	
  
these	
  devices	
  are	
  gradually	
  shiEed	
  to	
  employees.	
  
	
  	
  
1.	
  Iden(fy	
  BYOD	
  risks	
  to	
  the	
  company	
  as	
  well	
  as	
  to	
  its	
  customers	
  
	
  	
  
2.	
  Set	
  up	
  a	
  dedicated	
  BYOD	
  adop(on	
  team	
  within	
  your	
  company	
  
	
  	
  
3.	
  Clearly	
  define	
  a	
  company	
  BYOD	
  policy	
  covering	
  
	
  	
  
4.	
  Communicate	
  Clearly	
  with	
  Employees	
  
	
  	
  
1.	
  Iden(fy	
  BYOD	
  risks	
  to	
  the	
  company	
  as	
  well	
  as	
  to	
  its	
  customers	
  

-­‐  PotenCal	
  risks	
  
	
  
-­‐  PotenCal	
  soluCons	
  
	
  	
  
2.	
  Set	
  up	
  a	
  dedicated	
  BYOD	
  adop(on	
  team	
  within	
  your	
  company	
  headed	
  by	
  the	
  IT	
  
department	
  and	
  responsible	
  for:	
  
	
  
	
  

-­‐  preparing	
  informaCon	
  on	
  best	
  IT	
  pracCces	
  
	
  
-­‐  defining	
  the	
  procedures	
  to	
  be	
  used	
  in	
  the	
  event	
  that	
  personal	
  devices	
  
containing	
  company	
  data	
  are	
  lost	
  or	
  stolen.	
  
	
  	
  
3.	
  Clearly	
  define	
  a	
  company	
  BYOD	
  policy	
  covering	
  

-­‐	
  the	
  connecCng	
  of	
  peripheral	
  devices	
  to	
  the	
  company	
  network	
  
-­‐	
  applicaCon	
  control	
  
-­‐	
  cloud	
  storage	
  security	
  
-­‐	
  access	
  rights	
  allocaCon	
  
-­‐	
  IT	
  security	
  and	
  data	
  leak	
  prevenCon.	
  
	
  	
  
4.	
  Communicate	
  Clearly	
  with	
  Employees	
  

All	
  employees	
  must	
  understand	
  their	
  rights	
  and	
  responsibiliCes	
  with	
  regard	
  to	
  the	
  
BYOD	
  policy.	
  	
  
	
  
Employees	
  must	
  recognize	
  and	
  keep	
  in	
  mind	
  the	
  risks	
  to	
  the	
  company	
  and	
  foster	
  a	
  
spirit	
  of	
  collecCve	
  responsibility.	
  
	
  	
  
Turn BYOD into a Business Asset
Turn BYOD into a Business Asset
Turn BYOD into a Business Asset
Turn BYOD into a Business Asset
Turn BYOD into a Business Asset
Turn BYOD into a Business Asset
Turn BYOD into a Business Asset
Turn BYOD into a Business Asset
Turn BYOD into a Business Asset
Turn BYOD into a Business Asset
Turn BYOD into a Business Asset
Turn BYOD into a Business Asset
Turn BYOD into a Business Asset
Turn BYOD into a Business Asset
Turn BYOD into a Business Asset

More Related Content

Similar to Turn BYOD into a Business Asset

Come costruire una strategia vincente di BYOD, Bring Your Own Device | Clever...
Come costruire una strategia vincente di BYOD, Bring Your Own Device | Clever...Come costruire una strategia vincente di BYOD, Bring Your Own Device | Clever...
Come costruire una strategia vincente di BYOD, Bring Your Own Device | Clever...Clever Consulting
 
How To Do BYOD Right
How To Do BYOD RightHow To Do BYOD Right
How To Do BYOD RightRapidScale
 
The Accidental Cloud: Privacy and Security Issues in a BYOD World
The Accidental Cloud: Privacy and Security Issues in a BYOD WorldThe Accidental Cloud: Privacy and Security Issues in a BYOD World
The Accidental Cloud: Privacy and Security Issues in a BYOD Worldmkeane
 
BYOD Security
BYOD SecurityBYOD Security
BYOD SecurityHexnode
 
Enterprise Mobility Management and its Challenges - Phdassistance.com
Enterprise Mobility Management and its Challenges - Phdassistance.comEnterprise Mobility Management and its Challenges - Phdassistance.com
Enterprise Mobility Management and its Challenges - Phdassistance.comPhD Assistance
 
Bring Your Own Device is a disruptive phenomenon that is a significant IT trend
Bring Your Own Device is a disruptive phenomenon that is a significant IT trendBring Your Own Device is a disruptive phenomenon that is a significant IT trend
Bring Your Own Device is a disruptive phenomenon that is a significant IT trendMartin Perry
 
BYOD- A Productivity Catalyst
BYOD- A Productivity CatalystBYOD- A Productivity Catalyst
BYOD- A Productivity CatalystPacket One
 
BYOD: Bring Your Own Device Implementation and Security Issues
BYOD: Bring Your Own Device Implementation and Security IssuesBYOD: Bring Your Own Device Implementation and Security Issues
BYOD: Bring Your Own Device Implementation and Security IssuesHarsh Kishore Mishra
 
IS3101 Tutorial Task 2
IS3101 Tutorial Task 2IS3101 Tutorial Task 2
IS3101 Tutorial Task 2J M
 
Running Head CYBER SECURITY IMPROVEMENT AREASCYBER SECURITY.docx
Running Head CYBER SECURITY IMPROVEMENT AREASCYBER SECURITY.docxRunning Head CYBER SECURITY IMPROVEMENT AREASCYBER SECURITY.docx
Running Head CYBER SECURITY IMPROVEMENT AREASCYBER SECURITY.docxsusanschei
 
Enterprise Mobility Management and its challenges - Phdassistance.com
Enterprise Mobility Management and its challenges - Phdassistance.comEnterprise Mobility Management and its challenges - Phdassistance.com
Enterprise Mobility Management and its challenges - Phdassistance.comPhD Assistance
 
Bring your own device guidance
Bring your own device guidanceBring your own device guidance
Bring your own device guidanceGary Chambers
 
Bringing your-own-device usage policy for abc university collage employees
Bringing your-own-device usage policy for abc university collage employeesBringing your-own-device usage policy for abc university collage employees
Bringing your-own-device usage policy for abc university collage employeesKushmi Anuththara
 

Similar to Turn BYOD into a Business Asset (20)

Come costruire una strategia vincente di BYOD, Bring Your Own Device | Clever...
Come costruire una strategia vincente di BYOD, Bring Your Own Device | Clever...Come costruire una strategia vincente di BYOD, Bring Your Own Device | Clever...
Come costruire una strategia vincente di BYOD, Bring Your Own Device | Clever...
 
How To Do BYOD Right
How To Do BYOD RightHow To Do BYOD Right
How To Do BYOD Right
 
How to Do BYOD Right
How to Do BYOD RightHow to Do BYOD Right
How to Do BYOD Right
 
08 pdf show-239
08   pdf show-23908   pdf show-239
08 pdf show-239
 
The Accidental Cloud: Privacy and Security Issues in a BYOD World
The Accidental Cloud: Privacy and Security Issues in a BYOD WorldThe Accidental Cloud: Privacy and Security Issues in a BYOD World
The Accidental Cloud: Privacy and Security Issues in a BYOD World
 
BYOD Security
BYOD SecurityBYOD Security
BYOD Security
 
Enterprise Mobility Management and its Challenges - Phdassistance.com
Enterprise Mobility Management and its Challenges - Phdassistance.comEnterprise Mobility Management and its Challenges - Phdassistance.com
Enterprise Mobility Management and its Challenges - Phdassistance.com
 
NCSC_SBG_Actions.pdf
NCSC_SBG_Actions.pdfNCSC_SBG_Actions.pdf
NCSC_SBG_Actions.pdf
 
ACT 2014 Business or Pleasure the Challenges of Bring Your Own Device Policie...
ACT 2014 Business or Pleasure the Challenges of Bring Your Own Device Policie...ACT 2014 Business or Pleasure the Challenges of Bring Your Own Device Policie...
ACT 2014 Business or Pleasure the Challenges of Bring Your Own Device Policie...
 
Byod security
Byod security Byod security
Byod security
 
Bring Your Own Device is a disruptive phenomenon that is a significant IT trend
Bring Your Own Device is a disruptive phenomenon that is a significant IT trendBring Your Own Device is a disruptive phenomenon that is a significant IT trend
Bring Your Own Device is a disruptive phenomenon that is a significant IT trend
 
BYOD- A Productivity Catalyst
BYOD- A Productivity CatalystBYOD- A Productivity Catalyst
BYOD- A Productivity Catalyst
 
BYOD: Bring Your Own Device Implementation and Security Issues
BYOD: Bring Your Own Device Implementation and Security IssuesBYOD: Bring Your Own Device Implementation and Security Issues
BYOD: Bring Your Own Device Implementation and Security Issues
 
IS3101 Tutorial Task 2
IS3101 Tutorial Task 2IS3101 Tutorial Task 2
IS3101 Tutorial Task 2
 
Running Head CYBER SECURITY IMPROVEMENT AREASCYBER SECURITY.docx
Running Head CYBER SECURITY IMPROVEMENT AREASCYBER SECURITY.docxRunning Head CYBER SECURITY IMPROVEMENT AREASCYBER SECURITY.docx
Running Head CYBER SECURITY IMPROVEMENT AREASCYBER SECURITY.docx
 
Byod final (2)
Byod   final (2)Byod   final (2)
Byod final (2)
 
Leveraging byod
Leveraging byodLeveraging byod
Leveraging byod
 
Enterprise Mobility Management and its challenges - Phdassistance.com
Enterprise Mobility Management and its challenges - Phdassistance.comEnterprise Mobility Management and its challenges - Phdassistance.com
Enterprise Mobility Management and its challenges - Phdassistance.com
 
Bring your own device guidance
Bring your own device guidanceBring your own device guidance
Bring your own device guidance
 
Bringing your-own-device usage policy for abc university collage employees
Bringing your-own-device usage policy for abc university collage employeesBringing your-own-device usage policy for abc university collage employees
Bringing your-own-device usage policy for abc university collage employees
 

More from The Cloud Communications division of NTT Ltd.

Руководство Arkadin по организации собраний, к которым можно подключаться из ...
Руководство Arkadin по организации собраний, к которым можно подключаться из ...Руководство Arkadin по организации собраний, к которым можно подключаться из ...
Руководство Arkadin по организации собраний, к которым можно подключаться из ...The Cloud Communications division of NTT Ltd.
 
Собрания, отвечающие вашим уникальным потребностям
Собрания, отвечающие вашим уникальным потребностямСобрания, отвечающие вашим уникальным потребностям
Собрания, отвечающие вашим уникальным потребностямThe Cloud Communications division of NTT Ltd.
 

More from The Cloud Communications division of NTT Ltd. (20)

The Cloud Communications division of NTT Ltd.
The Cloud Communications division of NTT Ltd. The Cloud Communications division of NTT Ltd.
The Cloud Communications division of NTT Ltd.
 
Reuniões tão únicas quanto você
Reuniões tão únicas quanto vocêReuniões tão únicas quanto você
Reuniões tão únicas quanto você
 
Um dia na vida de um usuário do ArkadinVision
Um dia na vida de um usuário do ArkadinVisionUm dia na vida de um usuário do ArkadinVision
Um dia na vida de um usuário do ArkadinVision
 
Green and on-the-go: Actioning environmental prosperity through tech
Green and on-the-go: Actioning environmental prosperity through techGreen and on-the-go: Actioning environmental prosperity through tech
Green and on-the-go: Actioning environmental prosperity through tech
 
Руководство Arkadin по организации собраний, к которым можно подключаться из ...
Руководство Arkadin по организации собраний, к которым можно подключаться из ...Руководство Arkadin по организации собраний, к которым можно подключаться из ...
Руководство Arkadin по организации собраний, к которым можно подключаться из ...
 
Собрания, отвечающие вашим уникальным потребностям
Собрания, отвечающие вашим уникальным потребностямСобрания, отвечающие вашим уникальным потребностям
Собрания, отвечающие вашим уникальным потребностям
 
Tıpkı sizin kadar benzersiz toplantılar
Tıpkı sizin kadar benzersiz toplantılarTıpkı sizin kadar benzersiz toplantılar
Tıpkı sizin kadar benzersiz toplantılar
 
Bir ArkadinVision Kullanıcısının Hayatından Bir Gün
Bir ArkadinVision Kullanıcısının Hayatından Bir GünBir ArkadinVision Kullanıcısının Hayatından Bir Gün
Bir ArkadinVision Kullanıcısının Hayatından Bir Gün
 
Spotkania tak wyjątkowe jak Ty
Spotkania tak wyjątkowe jak TySpotkania tak wyjątkowe jak Ty
Spotkania tak wyjątkowe jak Ty
 
Dzień z życia użytkownika ArkadinVision
Dzień z życia użytkownika ArkadinVisionDzień z życia użytkownika ArkadinVision
Dzień z życia użytkownika ArkadinVision
 
Schůzky a konference jsou jedinečné jako vy
Schůzky a konference jsou jedinečné jako vySchůzky a konference jsou jedinečné jako vy
Schůzky a konference jsou jedinečné jako vy
 
Všední den v životě uživatele ArkadinVision
Všední den v životě uživatele ArkadinVisionVšední den v životě uživatele ArkadinVision
Všední den v životě uživatele ArkadinVision
 
How Much Energy Would Your Business Save With Remote Working
How Much Energy Would Your Business Save With Remote WorkingHow Much Energy Would Your Business Save With Remote Working
How Much Energy Would Your Business Save With Remote Working
 
10 ways to master the art of productivity Bruce Lee style
10 ways to master the art of productivity Bruce Lee style10 ways to master the art of productivity Bruce Lee style
10 ways to master the art of productivity Bruce Lee style
 
The heroic journey to the digital workplace: Our hero returns
The heroic journey to the digital workplace: Our hero returnsThe heroic journey to the digital workplace: Our hero returns
The heroic journey to the digital workplace: Our hero returns
 
7 pieces of furniture that increase your productivity
7 pieces of furniture that increase your productivity7 pieces of furniture that increase your productivity
7 pieces of furniture that increase your productivity
 
Top 7 tools to supercharge your team based collaboration
Top 7 tools to supercharge your team based collaborationTop 7 tools to supercharge your team based collaboration
Top 7 tools to supercharge your team based collaboration
 
Arkadin Value Prop video
Arkadin Value Prop videoArkadin Value Prop video
Arkadin Value Prop video
 
Arkadin value prop Event
Arkadin value prop EventArkadin value prop Event
Arkadin value prop Event
 
Arkadin value prop Corporate
Arkadin value prop CorporateArkadin value prop Corporate
Arkadin value prop Corporate
 

Recently uploaded

Varsha Sewlal- Cyber Attacks on Critical Critical Infrastructure
Varsha Sewlal- Cyber Attacks on Critical Critical InfrastructureVarsha Sewlal- Cyber Attacks on Critical Critical Infrastructure
Varsha Sewlal- Cyber Attacks on Critical Critical Infrastructureitnewsafrica
 
[Webinar] SpiraTest - Setting New Standards in Quality Assurance
[Webinar] SpiraTest - Setting New Standards in Quality Assurance[Webinar] SpiraTest - Setting New Standards in Quality Assurance
[Webinar] SpiraTest - Setting New Standards in Quality AssuranceInflectra
 
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024BookNet Canada
 
Modern Roaming for Notes and Nomad – Cheaper Faster Better Stronger
Modern Roaming for Notes and Nomad – Cheaper Faster Better StrongerModern Roaming for Notes and Nomad – Cheaper Faster Better Stronger
Modern Roaming for Notes and Nomad – Cheaper Faster Better Strongerpanagenda
 
Scale your database traffic with Read & Write split using MySQL Router
Scale your database traffic with Read & Write split using MySQL RouterScale your database traffic with Read & Write split using MySQL Router
Scale your database traffic with Read & Write split using MySQL RouterMydbops
 
Connecting the Dots for Information Discovery.pdf
Connecting the Dots for Information Discovery.pdfConnecting the Dots for Information Discovery.pdf
Connecting the Dots for Information Discovery.pdfNeo4j
 
Time Series Foundation Models - current state and future directions
Time Series Foundation Models - current state and future directionsTime Series Foundation Models - current state and future directions
Time Series Foundation Models - current state and future directionsNathaniel Shimoni
 
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxDigital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxLoriGlavin3
 
A Framework for Development in the AI Age
A Framework for Development in the AI AgeA Framework for Development in the AI Age
A Framework for Development in the AI AgeCprime
 
Bridging Between CAD & GIS: 6 Ways to Automate Your Data Integration
Bridging Between CAD & GIS:  6 Ways to Automate Your Data IntegrationBridging Between CAD & GIS:  6 Ways to Automate Your Data Integration
Bridging Between CAD & GIS: 6 Ways to Automate Your Data Integrationmarketing932765
 
Top 10 Hubspot Development Companies in 2024
Top 10 Hubspot Development Companies in 2024Top 10 Hubspot Development Companies in 2024
Top 10 Hubspot Development Companies in 2024TopCSSGallery
 
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...Alkin Tezuysal
 
The Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsThe Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsPixlogix Infotech
 
Generative AI - Gitex v1Generative AI - Gitex v1.pptx
Generative AI - Gitex v1Generative AI - Gitex v1.pptxGenerative AI - Gitex v1Generative AI - Gitex v1.pptx
Generative AI - Gitex v1Generative AI - Gitex v1.pptxfnnc6jmgwh
 
Design pattern talk by Kaya Weers - 2024 (v2)
Design pattern talk by Kaya Weers - 2024 (v2)Design pattern talk by Kaya Weers - 2024 (v2)
Design pattern talk by Kaya Weers - 2024 (v2)Kaya Weers
 
UiPath Community: Communication Mining from Zero to Hero
UiPath Community: Communication Mining from Zero to HeroUiPath Community: Communication Mining from Zero to Hero
UiPath Community: Communication Mining from Zero to HeroUiPathCommunity
 
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxThe Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxLoriGlavin3
 
Glenn Lazarus- Why Your Observability Strategy Needs Security Observability
Glenn Lazarus- Why Your Observability Strategy Needs Security ObservabilityGlenn Lazarus- Why Your Observability Strategy Needs Security Observability
Glenn Lazarus- Why Your Observability Strategy Needs Security Observabilityitnewsafrica
 
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxUse of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxLoriGlavin3
 
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxMerck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxLoriGlavin3
 

Recently uploaded (20)

Varsha Sewlal- Cyber Attacks on Critical Critical Infrastructure
Varsha Sewlal- Cyber Attacks on Critical Critical InfrastructureVarsha Sewlal- Cyber Attacks on Critical Critical Infrastructure
Varsha Sewlal- Cyber Attacks on Critical Critical Infrastructure
 
[Webinar] SpiraTest - Setting New Standards in Quality Assurance
[Webinar] SpiraTest - Setting New Standards in Quality Assurance[Webinar] SpiraTest - Setting New Standards in Quality Assurance
[Webinar] SpiraTest - Setting New Standards in Quality Assurance
 
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
 
Modern Roaming for Notes and Nomad – Cheaper Faster Better Stronger
Modern Roaming for Notes and Nomad – Cheaper Faster Better StrongerModern Roaming for Notes and Nomad – Cheaper Faster Better Stronger
Modern Roaming for Notes and Nomad – Cheaper Faster Better Stronger
 
Scale your database traffic with Read & Write split using MySQL Router
Scale your database traffic with Read & Write split using MySQL RouterScale your database traffic with Read & Write split using MySQL Router
Scale your database traffic with Read & Write split using MySQL Router
 
Connecting the Dots for Information Discovery.pdf
Connecting the Dots for Information Discovery.pdfConnecting the Dots for Information Discovery.pdf
Connecting the Dots for Information Discovery.pdf
 
Time Series Foundation Models - current state and future directions
Time Series Foundation Models - current state and future directionsTime Series Foundation Models - current state and future directions
Time Series Foundation Models - current state and future directions
 
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxDigital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
 
A Framework for Development in the AI Age
A Framework for Development in the AI AgeA Framework for Development in the AI Age
A Framework for Development in the AI Age
 
Bridging Between CAD & GIS: 6 Ways to Automate Your Data Integration
Bridging Between CAD & GIS:  6 Ways to Automate Your Data IntegrationBridging Between CAD & GIS:  6 Ways to Automate Your Data Integration
Bridging Between CAD & GIS: 6 Ways to Automate Your Data Integration
 
Top 10 Hubspot Development Companies in 2024
Top 10 Hubspot Development Companies in 2024Top 10 Hubspot Development Companies in 2024
Top 10 Hubspot Development Companies in 2024
 
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...
 
The Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsThe Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and Cons
 
Generative AI - Gitex v1Generative AI - Gitex v1.pptx
Generative AI - Gitex v1Generative AI - Gitex v1.pptxGenerative AI - Gitex v1Generative AI - Gitex v1.pptx
Generative AI - Gitex v1Generative AI - Gitex v1.pptx
 
Design pattern talk by Kaya Weers - 2024 (v2)
Design pattern talk by Kaya Weers - 2024 (v2)Design pattern talk by Kaya Weers - 2024 (v2)
Design pattern talk by Kaya Weers - 2024 (v2)
 
UiPath Community: Communication Mining from Zero to Hero
UiPath Community: Communication Mining from Zero to HeroUiPath Community: Communication Mining from Zero to Hero
UiPath Community: Communication Mining from Zero to Hero
 
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxThe Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
 
Glenn Lazarus- Why Your Observability Strategy Needs Security Observability
Glenn Lazarus- Why Your Observability Strategy Needs Security ObservabilityGlenn Lazarus- Why Your Observability Strategy Needs Security Observability
Glenn Lazarus- Why Your Observability Strategy Needs Security Observability
 
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxUse of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
 
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxMerck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
 

Turn BYOD into a Business Asset

  • 1. Turn  BYOD  into  a  Business   Asset  
  • 2. BYOD  =  Bring  Your  Own  Device  =  employees  use  their  own   personal  electronic  devices  in  the  workplace.          
  • 3. IntroducCon:  New  trend  brings  business  perks   Businesses  are  beginning  to  assess  the  benefits  of  BYOD:     -­‐  increased  flexibility  and  responsiveness  from  employees  who  remain  connected  to   work  regardless  of  their  locaCon     -­‐  employees  are  more  producCve  using  their  own  familiar—and  oEen  faster—devices     -­‐        hardware  savings  since  the  purchase,  maintenance,  management,  and  accessories  for   these  devices  are  gradually  shiEed  to  employees.      
  • 4. 1.  Iden(fy  BYOD  risks  to  the  company  as  well  as  to  its  customers       2.  Set  up  a  dedicated  BYOD  adop(on  team  within  your  company       3.  Clearly  define  a  company  BYOD  policy  covering       4.  Communicate  Clearly  with  Employees      
  • 5. 1.  Iden(fy  BYOD  risks  to  the  company  as  well  as  to  its  customers   -­‐  PotenCal  risks     -­‐  PotenCal  soluCons      
  • 6. 2.  Set  up  a  dedicated  BYOD  adop(on  team  within  your  company  headed  by  the  IT   department  and  responsible  for:       -­‐  preparing  informaCon  on  best  IT  pracCces     -­‐  defining  the  procedures  to  be  used  in  the  event  that  personal  devices   containing  company  data  are  lost  or  stolen.      
  • 7. 3.  Clearly  define  a  company  BYOD  policy  covering   -­‐  the  connecCng  of  peripheral  devices  to  the  company  network   -­‐  applicaCon  control   -­‐  cloud  storage  security   -­‐  access  rights  allocaCon   -­‐  IT  security  and  data  leak  prevenCon.      
  • 8. 4.  Communicate  Clearly  with  Employees   All  employees  must  understand  their  rights  and  responsibiliCes  with  regard  to  the   BYOD  policy.       Employees  must  recognize  and  keep  in  mind  the  risks  to  the  company  and  foster  a   spirit  of  collecCve  responsibility.