this article describes the BYOD technology. Furthermor, when our devices has been stolen or lost, we must recover it, it contains our secret and professionel informations. We have presented 3 main ways that could help us to secure these informations in case of thefts or criminal use
Unblocking The Main Thread Solving ANRs and Frozen Frames
BYOD - Bring Your Own Device
1. BYOD - Bring Your Own Device
Rihab CHEBBAH
20 January 2017
Abstract
With our increasingly connected lifestyle, the BYOD technology has been deeply in-
volved in society. It refers to the use of personnal equipement in a professional context.
These personal equipements will contain valuable data from our digital life; emails, con-
tacts, photos, videos, text messages ;in other words, important personal and business
information. Therefor, the informations are extremely exposed to the risk of theft.
How to avoid loss of data but also their fraudulent use?
BYOD technology
BYOD is the abbreviation of "Bring Your
Own Decive". Companies around the word
allows their employees to bring their personal
equipements to work and connect to the com-
panies resources. That way, they can work
with their personal computer, can save based
information on their personal phone or either
have access from their home.
Now, BYOD is not just walking around the
oce with your personal devices, it has a lot
more applictions for the organisation working
crosses.
The main process of BYOD, is the productiv-
ity and the satisfaction in work increase. this
is due to the fact that using the own devices
and applications make the workers feel more
confortable. also thet can work with more ex-
ibility choosing when and where since their de-
vices with them constantly. the company also
saves a lot of money in technologies resources.
However, the main disadvantage of BYOD
is security. The companies information is in
a risk. For example, if the employee looses his
phone , this requires a big maintain in the con-
trol from the IT department and a bigger cost
of web data.
to avoid this, it's a imoortant to have a Mobile
Device Management(MDM). This program al-
lows you to garante the security of information.
You can either use a systematic protection of
the smartphone with a password or a geoloca-
tion application and furthermore you can use a
backup solution for your smartphone that syn-
chronises les, passwords, e-mails, contacts ...
Secure digital information
There are specic methods to protect digital
information from theft or criminal use.
Systematic protection with a pass-
word
Do not protect your phone with a password is
irresponsible, especially when it contains pro-
fessional information. The password must be
long (8 characters preferably, with numbers,
letters, but also symbols. Also, we need to get
sure that the phone locks automatically when
it isn't in use.
Passwords can't be just a set of characters.
1
2. There are also the Fingerprint identication
and Eyeprint identication.
Geolocation application
In the event of loss or theft of the smartphone,
many applications allow it to remotely track,
lock and erase the contents of the phone be-
fore a criminal can access and use sensitive or
personal data.
However, some applications only work if they
are installed on the phone beforehand. Man-
ufacturers like Apple, Samsung and Microsoft
oer Smartphone localization applications.
The use of applications developed by third
parties is also possible, but caution must be
taken, it is necessary to verify the credibility
of the source.
Backup solution
The two previous steps may discourage crim-
inal use of the data, but only this step can
restore the entire contents of the phone.
A smartphone backup solution saves photos,
videos, contacts, events, reminders and mes-
sages and restores data to a new device. When
you rst save your smartphone, all your data
is saved in the Cloud. After this rst backup,
only data that has been modied or added
will be automatically saved. All backups are
performed in the background to prevent the
parallel use of the smartphone.
2