Reference no: EM131040574
"Bring Your Own Device" Can Cause Problems
Hamilton Fraser (www.hamiltonfraser.co.uk), located in North London, is an insurance company that specializes in home insurance. The firm is one of Great Britain's major contractors for its deposit protection system, which assigns an independent arbitrator to both tenants and landlords to resolve any disputes when a tenant moves from a rented property. The company's IT manager, Pete Agathangelou, claims that information security is his highest priority because credibility is critical to his company's success. He began to focus specifi ally on security threats from "bring your own device (BYOD)" in 2012 when he observed basic changes in his office environment. For example, he noticed that at lunchtime younger employees utilized their mobile devices to play games and contact their friends on social networks. He also observed that many senior executives were accessing their e-mail on mobile devices when they were out of the office. Hamilton Fraser had already embraced mobile computing by allowing its employees to have iPhones and iPads. However, employees were using other devices-particularly Android devices-on the company network. Agathangelou concluded that he needed a system to manage all of the mobile devices that the employees were utilizing.
The first step in creating this system was to find a vendor who could manage the issue of employees accessing the corporate network with their own mobile devices. The company ultimately selected MobileIron (www.mobileiron.com), a firm that provides mobile device management and security to large enterprises. MobileIron allowed Hamilton Fraser to identify which mobile devices the company would support. The MobileIron software enabled Hamilton Fraser to keep track of how many employees were accessing the firm's network for business purposes (as opposed to, e.g., playing games or shopping) and whether they were using an approved device. The company's human resources department developed an acceptable use policy, and it began to conduct short training sessions to raise awareness of this policy among employees.
The policy dictates that employees who use mobile devices must download an application to their smartphone or tablet that will enable the IT department to erase any corporate data from the device if it is lost or stolen, or to erase all data from the device if the employee so wishes. Sources: Compiled from J. Gold, "Has BYOD Peaked?" Computerworld, March 21, 2013; J. Scott,
1. What are the advantages of allowing employees to use any mobile device to connect to the corporate network? The dis advantages?
2. Why is it necessary to be able to erase corporate data if a mobile device is lost or stolen?
Windows network services proposal
: Each student will create a detailed, organized, unified technical solution given the scenario described below. The submission will be in a written format, with at least one diagram, and may include additional diagrams, charts or tables. The assign..
|
What are the differences between power and leadership
: What types of power tactics have you used in your own interactions with bosses, co-workers, or employees? Which do you find most effective? Why?
|
Growth in telecommuting and other mobile work arrangements
: Given the growth in telecommuting and other mobile work arrangements, how might offices physically change in the coming years? Will offices as we think of them today exist by 2020? Why or why not?
|
Reduce the potential for economic damage
: Disaster planning can help eliminate and reduce the potential for economic damage, loss of life, and destruction of property during a disaster. This task will focus on the recovery phase of the disaster recovery cycle.
|
Bring your own device can cause problems
: Hamilton Fraser (www.hamiltonfraser.co.uk), located in North London, is an insurance company that specializes in home insurance. The firm is one of Great Britain's major contractors for its deposit protection system, which assigns an independent a..
|
Identify the specific components of an an institution
: Identify the specific components of an an institution. Next use two (2) examples of institutions - such as a financial system, a judical system, or the armed forces - to illustrate what developing countries overall have done to weaken or strength..
|
Activities of the employee benefit system
: Alice has a high regard for privacy and wants the system to have employeesregister and give permission to obtain financial amounts from the dental insurance and retirementcompanies. Draw a use case diagram, context-level data flow diagram represen..
|
Examine the various tools and techniques for analyzing
: Examine the various tools and techniques for analyzing and monitoring the organization's environment. In your response, focus on two of the examples included in the text. First define the tool or technique; then, provide a scenario in which this t..
|
Organization uses effective communication techniques
: Describe both the formal and informal communication methods within the organization. Address whether or not the organization uses effective communication techniques. Evaluate the role culture plays in both the formal and informal methods of communica..
|