Chat with us, powered by LiveChat BRING YOUR OWN DEVICE SECURITY ISSUES - Writeden

Bring your own device (BYOD) to work has gained increased popularity and is in use in many organizations. Along with this convenience for employees are some major security issues for cyber security professionals.
RESOURCES

Be sure to review the Learning Resources before completing this activity. 
Click the weekly resources link to access the resources. 
WEEKLY RESOURCES
To prepare for this Discussion:
Review your experiences with BYOD.
Then search the Walden library and the Internet for security issues related to BYOD.
Identify some of the best BYOD practices organizations have implemented to protect organizational data.
BY DAY 3
Post, in APA format, an analysis of how BYOD policies are causing organizational network issues. In 300–400 words:
Identify 2 or 3 top security concerns, issues, and best practices being implemented to protect organizations.
Share your experience with BYOD and whether they follow these best practices.
Refer to the Week 3 Discussion Rubric for specific grading elements and criteria. Your Instructor will use this grading rubric to assess your work.
Read a selection of your colleagues’ postings.
LEARNING RESOURCES
Required Readings
Turban, E., Pollard, C., & Wood, G. (2021). Information technology for management: Driving digital transformation to enhance local and global performance, growth and sustainability (12th ed.). Wiley.
oChapter 2, “Information Systems, IT Infrastructure, and the Cloud” (pp. 31–65)
oChapter 4, “Networks, the Internet of Things (IoT), and Edge Computing” (pp. 107–148)
Cisco. (2012). University embraces bring-your-own-device with wireless networkLinks to an external site.. http://www.eschoolnews.com/files/2012/06/UniversityEmbracesBringYourOwnDevice.pdf
CSO Staff. (2022, May 25). Security and privacy laws, regulations, and compliance: The complete guideLinks to an external site.. https://www.csoonline.com/article/3604334/csos-ultimate-guide-to-security-and-privacy-laws-regulations-and-compliance.html
Devane, H. (2021, June 29). The complete guide to data security compliance laws and regulationsLinks to an external site.. https://www.immuta.com/blog/the-complete-guide-to-data-security-compliance-laws-and-regulations
Miller, A., & Raza, M. (2022, January 28). Bring your own device (BYOD): Best practices for the workplaceLinks to an external site.. The Business of IT Blog. https://www.bmc.com/blogs/byod-policies
Optional Resources
Bring your own deviceLinks to an external site.. (2012). https://obamawhitehouse.archives.gov/digitalgov/bring-your-own-deviceLinks to an external site.
Walden University. (n.d.). APA style: OverviewLinks to an external site.. https://academicguides.waldenu.edu/writingcenter/apa
Walden University. (n.d.). Reference list: Common reference list examplesLinks to an external site..https://academicguides.waldenu.edu/writingcenter/apa/references/examples