"Bring Your Own Device (BYOD)

Computer Science
Tutor: None Selected Time limit: 1 Day

  • Identify three (3) risks that might result from implementing a BYOD policy. Suggest a method for mitigating each risk you have identified. Provide a rationale for your response.
Aug 2nd, 2015

Thank you for the opportunity to help you with your question!

Three risks that might affect integrity of an organization include:

1) Lost and stolen devices

2) Increased Data acsess

3) Malicious apps or malware

Solutions:

1) Password protection, encryption and available methods to wipe data once device is lost.

2) Monitor and store data on regular basis while keeping device free from important information

3) Restrict yourself to only trusted applications with updated antivirus/antimalware installed on your device

Please let me know if you need any clarification. I'm always happy to answer your questions.
Aug 2nd, 2015

Did you know? You can earn $20 for every friend you invite to Studypool!
Click here to
Refer a Friend
...
Aug 2nd, 2015
...
Aug 2nd, 2015
Mar 24th, 2017
check_circle
Mark as Final Answer
check_circle
Unmark as Final Answer
check_circle
Final Answer

Secure Information

Content will be erased after question is completed.

check_circle
Final Answer