1 / 1100%
Bringing your device has been a part of business culture since 2008, with
its popularization coming in 2011. Companies practicing BYOD enjoy cost-
saving through having to issue fewer devices to employees. However,
with these cost savings, they sacri'ce security. One of the most signi'cant
vulnerabilities added through the introduction of this technology is in the
form of end node vulnerabilities. An example of this end node weakness
that has caused many data breaches is when a device containing
sensitive information is lost or stolen by un-trusted parties. Another
example is when employees take their devices as they leave the
company.
  It is essential to observe end-user behavior. This “assists businesses by
revealing vulnerabilities which can help detect potential internal
threats.”(Downer,1) Often in talking about security, the end-user is the
weakest link, so understanding them will give businesses a more secure
standing. It has been proven time and again that having users trained in
company security policy is an e1ective mitigation tool against end user
negligence. When studying Australian companies on knowledge of
security protocol, there were positive 'ndings “Nearly 90% of employees
surveyed use at least one of their device’s default security mechanisms,
and a majority of employees believed that they had an adequate to good
knowledge of the potential threats and risks targeting mobile
devices.”(Downer,1). Employee compliance with security policy tells us
that although end users are the weakest link, their willingness to
understand and comply with the responsibility of owning a BYOD product
actively helps mitigate the risk of end-user negligence. In conclusion, it’s
essential to educate employees on BYOD practices, conduct surveys on
their sentiments toward policies, and make changes based on employee
sentiment. By encouraging employee empowerment and education, a
business can enjoy the cost savings and production bene'ts of BYOD
while mitigating end-user vulnerabilities.
References:
1. Downer, K., & Bhattacharya, M. (2022). BYOD Security: A Study of
Human Dimensions.https://doi.org/10.3390/informatics9010016
Students also viewed