SlideShare a Scribd company logo
1 of 1
Kamila,
I agree there is a risk/benefit dilemma when considering a bring
your own device (BYOD) policy. The statistics you quoted
from Trend Micro were enlightening regarding the high
incidence of data breaches when a BYOD policy was in place.
As you noted, vendors have developed software programs to
provide a high level of protection to safeguard systems that can
extend to personal devices. I like the sequestration of highly
sensitive information to an area that would be more secure
although this area could be breached as well by a motivated
hacker. Did the articles your reviewed mention who was in
charge of ensuring that all devices had appropriate software
installed and that updates where uploaded as released to
upgrade programs?

More Related Content

More from JospehStull43

A new University library will open next month at NYU. The $100 mil.docx
A new University library will open next month at NYU. The $100 mil.docxA new University library will open next month at NYU. The $100 mil.docx
A new University library will open next month at NYU. The $100 mil.docx
JospehStull43
 
A mass-casualty incident (MCI) creates a uniquely challenging manage.docx
A mass-casualty incident (MCI) creates a uniquely challenging manage.docxA mass-casualty incident (MCI) creates a uniquely challenging manage.docx
A mass-casualty incident (MCI) creates a uniquely challenging manage.docx
JospehStull43
 
A hot t, tropical grassland with scattered trees is aSavannaTun.docx
A hot t, tropical grassland with scattered trees is aSavannaTun.docxA hot t, tropical grassland with scattered trees is aSavannaTun.docx
A hot t, tropical grassland with scattered trees is aSavannaTun.docx
JospehStull43
 
A good interviewer uses interview methodologies and techniques that .docx
A good interviewer uses interview methodologies and techniques that .docxA good interviewer uses interview methodologies and techniques that .docx
A good interviewer uses interview methodologies and techniques that .docx
JospehStull43
 

More from JospehStull43 (20)

A political discussion group consists of five Democrats and six Repu.docx
A political discussion group consists of five Democrats and six Repu.docxA political discussion group consists of five Democrats and six Repu.docx
A political discussion group consists of five Democrats and six Repu.docx
 
a PowerPoint presentation consisting of 7 slides to complete this we.docx
a PowerPoint presentation consisting of 7 slides to complete this we.docxa PowerPoint presentation consisting of 7 slides to complete this we.docx
a PowerPoint presentation consisting of 7 slides to complete this we.docx
 
A number of Hollywood’s better efforts raise issues pertinent to thi.docx
A number of Hollywood’s better efforts raise issues pertinent to thi.docxA number of Hollywood’s better efforts raise issues pertinent to thi.docx
A number of Hollywood’s better efforts raise issues pertinent to thi.docx
 
A new IQ test is being developed and the test creators need to give .docx
A new IQ test is being developed and the test creators need to give .docxA new IQ test is being developed and the test creators need to give .docx
A new IQ test is being developed and the test creators need to give .docx
 
A new University library will open next month at NYU. The $100 mil.docx
A new University library will open next month at NYU. The $100 mil.docxA new University library will open next month at NYU. The $100 mil.docx
A new University library will open next month at NYU. The $100 mil.docx
 
A molecule of DNA (deoxyribonucleic acid) is 2.31µm long. Th.docx
A molecule of DNA (deoxyribonucleic acid) is 2.31µm long. Th.docxA molecule of DNA (deoxyribonucleic acid) is 2.31µm long. Th.docx
A molecule of DNA (deoxyribonucleic acid) is 2.31µm long. Th.docx
 
A minimum of 5 pages of text, not including the title page, bibliogr.docx
A minimum of 5 pages of text, not including the title page, bibliogr.docxA minimum of 5 pages of text, not including the title page, bibliogr.docx
A minimum of 5 pages of text, not including the title page, bibliogr.docx
 
A mass-casualty incident (MCI) creates a uniquely challenging manage.docx
A mass-casualty incident (MCI) creates a uniquely challenging manage.docxA mass-casualty incident (MCI) creates a uniquely challenging manage.docx
A mass-casualty incident (MCI) creates a uniquely challenging manage.docx
 
A hot t, tropical grassland with scattered trees is aSavannaTun.docx
A hot t, tropical grassland with scattered trees is aSavannaTun.docxA hot t, tropical grassland with scattered trees is aSavannaTun.docx
A hot t, tropical grassland with scattered trees is aSavannaTun.docx
 
A good interviewer uses interview methodologies and techniques that .docx
A good interviewer uses interview methodologies and techniques that .docxA good interviewer uses interview methodologies and techniques that .docx
A good interviewer uses interview methodologies and techniques that .docx
 
A major MNE has incredible knowledge resources but they often underu.docx
A major MNE has incredible knowledge resources but they often underu.docxA major MNE has incredible knowledge resources but they often underu.docx
A major MNE has incredible knowledge resources but they often underu.docx
 
A lack of awareness of cultural differences or the assumption by one.docx
A lack of awareness of cultural differences or the assumption by one.docxA lack of awareness of cultural differences or the assumption by one.docx
A lack of awareness of cultural differences or the assumption by one.docx
 
A fundamental tenet of the federal personnel system is merit-based d.docx
A fundamental tenet of the federal personnel system is merit-based d.docxA fundamental tenet of the federal personnel system is merit-based d.docx
A fundamental tenet of the federal personnel system is merit-based d.docx
 
A little monkey had 75 bananas,Each day, he kept a fraction of his.docx
A little monkey had 75 bananas,Each day, he kept a fraction of his.docxA little monkey had 75 bananas,Each day, he kept a fraction of his.docx
A little monkey had 75 bananas,Each day, he kept a fraction of his.docx
 
A five pages term paper about Bessie Smith.The term paper must.docx
A five pages term paper about Bessie Smith.The term paper must.docxA five pages term paper about Bessie Smith.The term paper must.docx
A five pages term paper about Bessie Smith.The term paper must.docx
 
a description of the cognitive ability you selected and how it is st.docx
a description of the cognitive ability you selected and how it is st.docxa description of the cognitive ability you selected and how it is st.docx
a description of the cognitive ability you selected and how it is st.docx
 
a description of two ways in which the Walden University’s IRB ethic.docx
a description of two ways in which the Walden University’s IRB ethic.docxa description of two ways in which the Walden University’s IRB ethic.docx
a description of two ways in which the Walden University’s IRB ethic.docx
 
a description of a time when you were influenced by a reciprocity, s.docx
a description of a time when you were influenced by a reciprocity, s.docxa description of a time when you were influenced by a reciprocity, s.docx
a description of a time when you were influenced by a reciprocity, s.docx
 
A comparison of the different kinds of unified communication platfor.docx
A comparison of the different kinds of unified communication platfor.docxA comparison of the different kinds of unified communication platfor.docx
A comparison of the different kinds of unified communication platfor.docx
 
a comparison (similarities and differences) between the executive’s .docx
a comparison (similarities and differences) between the executive’s .docxa comparison (similarities and differences) between the executive’s .docx
a comparison (similarities and differences) between the executive’s .docx
 

Kamila,I agree there is a riskbenefit dilemma when considerin

  • 1. Kamila, I agree there is a risk/benefit dilemma when considering a bring your own device (BYOD) policy. The statistics you quoted from Trend Micro were enlightening regarding the high incidence of data breaches when a BYOD policy was in place. As you noted, vendors have developed software programs to provide a high level of protection to safeguard systems that can extend to personal devices. I like the sequestration of highly sensitive information to an area that would be more secure although this area could be breached as well by a motivated hacker. Did the articles your reviewed mention who was in charge of ensuring that all devices had appropriate software installed and that updates where uploaded as released to upgrade programs?