SlideShare une entreprise Scribd logo
1  sur  8
BYODSecurity Risks
Presentation by
Ravi Namboori
Visit us @ http://ravinamboori.net
BYOD – BringYourOwn Device
 There is a growing trend for partnerships with community
colleges, manufacturers to develop curricula, and to select and
recruit candidates.
 Like all developments in technology, BYOD has its fair share
of pitfalls.
 There is a possibility of staff exploiting the BYOD
environment by going for upgraded phones or signing up for
maximum data plans. After all, these expenses have to be
borne by the employers.
BYOD -Threats
Adopting BYOD can lead to many problems further down the road
if you’re not aware of it properly.
Learn Few Risks:
The threats are forcing security teams to introduce new policies to
reduce the risk. Enforcing them without impacting productivity is a
balancing act. Experts say the first step is to understand the
perceived risks and weigh them against the company's security
posture.
Continued..
When BYOD was in its nascent stages, companies would erase
data remotely if a smartphone was lost. But people misplace their
phones at times, so it could lead to problems if critical data is
wiped off.
Developing BYOD Policy..
While developing BYOD policy, enterprises need to consider
the following:
Segmentation of users and decide on what depth of access should be
given to each specific segment.
What type of devices need to be permitted to access corporate data
i. Device specific security policies
ii. Need of well-defined service policies
iii. Defining use polices
The legal team has to ensure that managers are properly trained on the
BYOD user policy. No details can be afforded to be given a miss.
ToAvoid Risks:
 A BYOD workplace is being embraced by companies with an
effort to make staff more comfortable, leading to higher
productivity. It would also give them flexibility of working from
any location at any time and on any device of their choice.
 Some companies, however, see some employees misusing their
devices to play games or to access sites not related to their
work. Consequently, some apps have had to be added to the
BYOD blacklist.
Conclusion
Finally we can say instead of banning BYOD enable it securely
 Create a clear policy on BYOD rights and information security
rules.
 Train employees to protect work information accessed on
personal devices.
Thanks
Presentation by
Ravi Namboori
Visit us @ http://ravinamboori.in

Contenu connexe

Similaire à Ravi Namboori Equinix on BYOD Security Risks

BYOD: Bring Your Own Device Implementation and Security Issues
BYOD: Bring Your Own Device Implementation and Security IssuesBYOD: Bring Your Own Device Implementation and Security Issues
BYOD: Bring Your Own Device Implementation and Security IssuesHarsh Kishore Mishra
 
5 Steps to Successful BYOD Implementation
5 Steps to Successful BYOD Implementation5 Steps to Successful BYOD Implementation
5 Steps to Successful BYOD ImplementationJumpCloud
 
BYOD: Implementation and Security Issues
BYOD: Implementation and Security IssuesBYOD: Implementation and Security Issues
BYOD: Implementation and Security IssuesHarsh Kishore Mishra
 
BYOD SCOPE: A Study of Corporate Policies in Pakistan
BYOD SCOPE: A Study of Corporate Policies in PakistanBYOD SCOPE: A Study of Corporate Policies in Pakistan
BYOD SCOPE: A Study of Corporate Policies in PakistanShuja Ahmad
 
Phil Cracknell, Head of Security & Privacy Services at Company85 - BYO A good...
Phil Cracknell, Head of Security & Privacy Services at Company85 - BYO A good...Phil Cracknell, Head of Security & Privacy Services at Company85 - BYO A good...
Phil Cracknell, Head of Security & Privacy Services at Company85 - BYO A good...Global Business Events
 
OC CIO Roundtable BYOD
OC CIO Roundtable BYODOC CIO Roundtable BYOD
OC CIO Roundtable BYODJim Sutter
 
No byod policy? Time to grasp the nettle
No byod policy? Time to grasp the nettleNo byod policy? Time to grasp the nettle
No byod policy? Time to grasp the nettleLogicalis
 
BYOD Blue Paper
BYOD Blue PaperBYOD Blue Paper
BYOD Blue Paper4imprint
 
BYOD is Happening. Here's How to Make the Most of It
BYOD is Happening. Here's How to Make the Most of ItBYOD is Happening. Here's How to Make the Most of It
BYOD is Happening. Here's How to Make the Most of ItArlette Measures
 
Executive Summary: Considering a BYOD Infrastructure
 Executive Summary: Considering a BYOD Infrastructure Executive Summary: Considering a BYOD Infrastructure
Executive Summary: Considering a BYOD InfrastructureMelissa Andrews
 
PACE-IT, Security+ 4.2: Mobile Security Concepts and Technologies (part 2)
PACE-IT, Security+ 4.2: Mobile Security Concepts and Technologies (part 2)PACE-IT, Security+ 4.2: Mobile Security Concepts and Technologies (part 2)
PACE-IT, Security+ 4.2: Mobile Security Concepts and Technologies (part 2)Pace IT at Edmonds Community College
 
Bring Your Own Device 2014 TeamMate User Conference Palm Desert California
Bring Your Own Device 2014 TeamMate User Conference Palm Desert CaliforniaBring Your Own Device 2014 TeamMate User Conference Palm Desert California
Bring Your Own Device 2014 TeamMate User Conference Palm Desert CaliforniaJim Kaplan CIA CFE
 
Handheld Devices & BYOD: Are Enterprises There Yet? - Management Information ...
Handheld Devices & BYOD: Are Enterprises There Yet? - Management Information ...Handheld Devices & BYOD: Are Enterprises There Yet? - Management Information ...
Handheld Devices & BYOD: Are Enterprises There Yet? - Management Information ...Vishrut Shukla
 
Wondering About the "Bring Your Own Device to Work" Trend?
Wondering About the "Bring Your Own Device to Work" Trend?Wondering About the "Bring Your Own Device to Work" Trend?
Wondering About the "Bring Your Own Device to Work" Trend?Gen Re
 

Similaire à Ravi Namboori Equinix on BYOD Security Risks (20)

BYOD
BYODBYOD
BYOD
 
BYOD: Bring Your Own Device Implementation and Security Issues
BYOD: Bring Your Own Device Implementation and Security IssuesBYOD: Bring Your Own Device Implementation and Security Issues
BYOD: Bring Your Own Device Implementation and Security Issues
 
5 Steps to Successful BYOD Implementation
5 Steps to Successful BYOD Implementation5 Steps to Successful BYOD Implementation
5 Steps to Successful BYOD Implementation
 
Leveraging byod
Leveraging byodLeveraging byod
Leveraging byod
 
BYOD: Implementation and Security Issues
BYOD: Implementation and Security IssuesBYOD: Implementation and Security Issues
BYOD: Implementation and Security Issues
 
BYOD SCOPE: A Study of Corporate Policies in Pakistan
BYOD SCOPE: A Study of Corporate Policies in PakistanBYOD SCOPE: A Study of Corporate Policies in Pakistan
BYOD SCOPE: A Study of Corporate Policies in Pakistan
 
Phil Cracknell, Head of Security & Privacy Services at Company85 - BYO A good...
Phil Cracknell, Head of Security & Privacy Services at Company85 - BYO A good...Phil Cracknell, Head of Security & Privacy Services at Company85 - BYO A good...
Phil Cracknell, Head of Security & Privacy Services at Company85 - BYO A good...
 
OC CIO Roundtable BYOD
OC CIO Roundtable BYODOC CIO Roundtable BYOD
OC CIO Roundtable BYOD
 
OC CIO BYOD
OC CIO BYODOC CIO BYOD
OC CIO BYOD
 
How to Do BYOD Right
How to Do BYOD RightHow to Do BYOD Right
How to Do BYOD Right
 
No byod policy? Time to grasp the nettle
No byod policy? Time to grasp the nettleNo byod policy? Time to grasp the nettle
No byod policy? Time to grasp the nettle
 
BYOD Blue Paper
BYOD Blue PaperBYOD Blue Paper
BYOD Blue Paper
 
BYOD is Happening. Here's How to Make the Most of It
BYOD is Happening. Here's How to Make the Most of ItBYOD is Happening. Here's How to Make the Most of It
BYOD is Happening. Here's How to Make the Most of It
 
Executive Summary: Considering a BYOD Infrastructure
 Executive Summary: Considering a BYOD Infrastructure Executive Summary: Considering a BYOD Infrastructure
Executive Summary: Considering a BYOD Infrastructure
 
PACE-IT, Security+ 4.2: Mobile Security Concepts and Technologies (part 2)
PACE-IT, Security+ 4.2: Mobile Security Concepts and Technologies (part 2)PACE-IT, Security+ 4.2: Mobile Security Concepts and Technologies (part 2)
PACE-IT, Security+ 4.2: Mobile Security Concepts and Technologies (part 2)
 
Bring Your Own Device 2014 TeamMate User Conference Palm Desert California
Bring Your Own Device 2014 TeamMate User Conference Palm Desert CaliforniaBring Your Own Device 2014 TeamMate User Conference Palm Desert California
Bring Your Own Device 2014 TeamMate User Conference Palm Desert California
 
Handheld Devices & BYOD: Are Enterprises There Yet? - Management Information ...
Handheld Devices & BYOD: Are Enterprises There Yet? - Management Information ...Handheld Devices & BYOD: Are Enterprises There Yet? - Management Information ...
Handheld Devices & BYOD: Are Enterprises There Yet? - Management Information ...
 
Byod
ByodByod
Byod
 
Bring Your Own Device (BYOD)
Bring Your Own Device (BYOD)Bring Your Own Device (BYOD)
Bring Your Own Device (BYOD)
 
Wondering About the "Bring Your Own Device to Work" Trend?
Wondering About the "Bring Your Own Device to Work" Trend?Wondering About the "Bring Your Own Device to Work" Trend?
Wondering About the "Bring Your Own Device to Work" Trend?
 

Plus de Ravi namboori

Copy Data Management & Storage Efficiency - Ravi Namboori
Copy Data Management & Storage Efficiency - Ravi NambooriCopy Data Management & Storage Efficiency - Ravi Namboori
Copy Data Management & Storage Efficiency - Ravi NambooriRavi namboori
 
Cloud Computing Risks by Ravi Namboori Cisco Evangelist
Cloud Computing Risks by Ravi Namboori Cisco EvangelistCloud Computing Risks by Ravi Namboori Cisco Evangelist
Cloud Computing Risks by Ravi Namboori Cisco EvangelistRavi namboori
 
Hadoop Mapreduce Job Execution By Ravi Namboori Babson
Hadoop Mapreduce Job Execution By Ravi Namboori BabsonHadoop Mapreduce Job Execution By Ravi Namboori Babson
Hadoop Mapreduce Job Execution By Ravi Namboori BabsonRavi namboori
 
Cloud Computing Basics by Ravi Namboori Cisco Evangelist
Cloud Computing Basics by Ravi Namboori Cisco EvangelistCloud Computing Basics by Ravi Namboori Cisco Evangelist
Cloud Computing Basics by Ravi Namboori Cisco EvangelistRavi namboori
 
Ravi Namboori Hadoop & HDFS Architecture
Ravi Namboori Hadoop & HDFS ArchitectureRavi Namboori Hadoop & HDFS Architecture
Ravi Namboori Hadoop & HDFS ArchitectureRavi namboori
 
IoT Risks and Conclusion by Ravi namboori Equinix
IoT Risks and Conclusion by Ravi namboori EquinixIoT Risks and Conclusion by Ravi namboori Equinix
IoT Risks and Conclusion by Ravi namboori EquinixRavi namboori
 
Ravi Namboori - Developing Cloud Applications In The New IT Era
Ravi Namboori - Developing Cloud Applications In The New IT EraRavi Namboori - Developing Cloud Applications In The New IT Era
Ravi Namboori - Developing Cloud Applications In The New IT EraRavi namboori
 
Role Of Software Defined Networking (SDN) in Present Complex Network Arena
Role Of Software Defined Networking (SDN) in Present Complex Network ArenaRole Of Software Defined Networking (SDN) in Present Complex Network Arena
Role Of Software Defined Networking (SDN) in Present Complex Network ArenaRavi namboori
 
Ravi Namboori 's Open stack framework introduction
Ravi Namboori 's Open stack framework introductionRavi Namboori 's Open stack framework introduction
Ravi Namboori 's Open stack framework introductionRavi namboori
 
Ravi namboori switching
Ravi namboori   switchingRavi namboori   switching
Ravi namboori switchingRavi namboori
 
Ravi namboori subnetting
Ravi namboori   subnettingRavi namboori   subnetting
Ravi namboori subnettingRavi namboori
 
Ravi Namboori's Network topologies
Ravi Namboori's Network topologiesRavi Namboori's Network topologies
Ravi Namboori's Network topologiesRavi namboori
 
What Is Modem presentation by Ravi namboori
What Is Modem presentation by Ravi nambooriWhat Is Modem presentation by Ravi namboori
What Is Modem presentation by Ravi nambooriRavi namboori
 
Ravi Namboori Cloud computing
Ravi Namboori Cloud computingRavi Namboori Cloud computing
Ravi Namboori Cloud computingRavi namboori
 

Plus de Ravi namboori (16)

Copy Data Management & Storage Efficiency - Ravi Namboori
Copy Data Management & Storage Efficiency - Ravi NambooriCopy Data Management & Storage Efficiency - Ravi Namboori
Copy Data Management & Storage Efficiency - Ravi Namboori
 
Cloud Computing Risks by Ravi Namboori Cisco Evangelist
Cloud Computing Risks by Ravi Namboori Cisco EvangelistCloud Computing Risks by Ravi Namboori Cisco Evangelist
Cloud Computing Risks by Ravi Namboori Cisco Evangelist
 
Hadoop Mapreduce Job Execution By Ravi Namboori Babson
Hadoop Mapreduce Job Execution By Ravi Namboori BabsonHadoop Mapreduce Job Execution By Ravi Namboori Babson
Hadoop Mapreduce Job Execution By Ravi Namboori Babson
 
Cloud Computing Basics by Ravi Namboori Cisco Evangelist
Cloud Computing Basics by Ravi Namboori Cisco EvangelistCloud Computing Basics by Ravi Namboori Cisco Evangelist
Cloud Computing Basics by Ravi Namboori Cisco Evangelist
 
Ravi Namboori Hadoop & HDFS Architecture
Ravi Namboori Hadoop & HDFS ArchitectureRavi Namboori Hadoop & HDFS Architecture
Ravi Namboori Hadoop & HDFS Architecture
 
IoT Risks and Conclusion by Ravi namboori Equinix
IoT Risks and Conclusion by Ravi namboori EquinixIoT Risks and Conclusion by Ravi namboori Equinix
IoT Risks and Conclusion by Ravi namboori Equinix
 
Ravi Namboori - Developing Cloud Applications In The New IT Era
Ravi Namboori - Developing Cloud Applications In The New IT EraRavi Namboori - Developing Cloud Applications In The New IT Era
Ravi Namboori - Developing Cloud Applications In The New IT Era
 
Role Of Software Defined Networking (SDN) in Present Complex Network Arena
Role Of Software Defined Networking (SDN) in Present Complex Network ArenaRole Of Software Defined Networking (SDN) in Present Complex Network Arena
Role Of Software Defined Networking (SDN) in Present Complex Network Arena
 
Sap hana
Sap hanaSap hana
Sap hana
 
Ravi Namboori 's Open stack framework introduction
Ravi Namboori 's Open stack framework introductionRavi Namboori 's Open stack framework introduction
Ravi Namboori 's Open stack framework introduction
 
Ravi namboori switching
Ravi namboori   switchingRavi namboori   switching
Ravi namboori switching
 
Ravi namboori subnetting
Ravi namboori   subnettingRavi namboori   subnetting
Ravi namboori subnetting
 
Ravi Namboori's Network topologies
Ravi Namboori's Network topologiesRavi Namboori's Network topologies
Ravi Namboori's Network topologies
 
What Is Modem presentation by Ravi namboori
What Is Modem presentation by Ravi nambooriWhat Is Modem presentation by Ravi namboori
What Is Modem presentation by Ravi namboori
 
Iaa s ravi namboori
Iaa s   ravi nambooriIaa s   ravi namboori
Iaa s ravi namboori
 
Ravi Namboori Cloud computing
Ravi Namboori Cloud computingRavi Namboori Cloud computing
Ravi Namboori Cloud computing
 

Dernier

WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure servicePooja Nehwal
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationRadu Cotescu
 
Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024The Digital Insurer
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonAnna Loughnan Colquhoun
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationMichael W. Hawkins
 
Top 5 Benefits OF Using Muvi Live Paywall For Live Streams
Top 5 Benefits OF Using Muvi Live Paywall For Live StreamsTop 5 Benefits OF Using Muvi Live Paywall For Live Streams
Top 5 Benefits OF Using Muvi Live Paywall For Live StreamsRoshan Dwivedi
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...Neo4j
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfEnterprise Knowledge
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking MenDelhi Call girls
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024Rafal Los
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsEnterprise Knowledge
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEarley Information Science
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdfhans926745
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)Gabriella Davis
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slidespraypatel2
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesSinan KOZAK
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Scriptwesley chun
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Enterprise Knowledge
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityPrincipled Technologies
 

Dernier (20)

WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
Top 5 Benefits OF Using Muvi Live Paywall For Live Streams
Top 5 Benefits OF Using Muvi Live Paywall For Live StreamsTop 5 Benefits OF Using Muvi Live Paywall For Live Streams
Top 5 Benefits OF Using Muvi Live Paywall For Live Streams
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slides
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen Frames
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 

Ravi Namboori Equinix on BYOD Security Risks

  • 1. BYODSecurity Risks Presentation by Ravi Namboori Visit us @ http://ravinamboori.net
  • 2. BYOD – BringYourOwn Device  There is a growing trend for partnerships with community colleges, manufacturers to develop curricula, and to select and recruit candidates.  Like all developments in technology, BYOD has its fair share of pitfalls.  There is a possibility of staff exploiting the BYOD environment by going for upgraded phones or signing up for maximum data plans. After all, these expenses have to be borne by the employers.
  • 3. BYOD -Threats Adopting BYOD can lead to many problems further down the road if you’re not aware of it properly. Learn Few Risks: The threats are forcing security teams to introduce new policies to reduce the risk. Enforcing them without impacting productivity is a balancing act. Experts say the first step is to understand the perceived risks and weigh them against the company's security posture.
  • 4. Continued.. When BYOD was in its nascent stages, companies would erase data remotely if a smartphone was lost. But people misplace their phones at times, so it could lead to problems if critical data is wiped off.
  • 5. Developing BYOD Policy.. While developing BYOD policy, enterprises need to consider the following: Segmentation of users and decide on what depth of access should be given to each specific segment. What type of devices need to be permitted to access corporate data i. Device specific security policies ii. Need of well-defined service policies iii. Defining use polices The legal team has to ensure that managers are properly trained on the BYOD user policy. No details can be afforded to be given a miss.
  • 6. ToAvoid Risks:  A BYOD workplace is being embraced by companies with an effort to make staff more comfortable, leading to higher productivity. It would also give them flexibility of working from any location at any time and on any device of their choice.  Some companies, however, see some employees misusing their devices to play games or to access sites not related to their work. Consequently, some apps have had to be added to the BYOD blacklist.
  • 7. Conclusion Finally we can say instead of banning BYOD enable it securely  Create a clear policy on BYOD rights and information security rules.  Train employees to protect work information accessed on personal devices.
  • 8. Thanks Presentation by Ravi Namboori Visit us @ http://ravinamboori.in