+1-316-444-1378

Please respond to the following: 1-2 paragraphs. Then respond in one paragraph to the additional post.

Your company is exploring the possibility of allowing employees to use their own mobile devices for their work and connect to the internal company network. In your role as the CSO, the CEO has asked you to brief her on what steps can be taken to implement a BYOD policy while reducing the overall risk to the organization as much as possible.

Write your talking points for the CEO, including the associated risks with BYOD, potential security countermeasures, and your initial thoughts on how you would test their implementation to assess the overall risk level. This can be in paragraph form or a bulleted list of your talking points.

Once that section is completed, respond in one paragraph to the post below. State if you agree or disagree and the reasoning why. You may also add on to the conversation.

Post:

While BYOD is becoming more commonplace in the workforce, there are risks in using your own device.

Because the employee is using their own device, it is possible for the employee to download malware that could potentially create a risk for company information that is stored on the device. This can helped with proper training for employees on how to spot malware and viruses, along with training on how to safely browse and use antivirus software.

Data theft is another issue to be concerned about. Public Wi-Fi networks could allow attackers to gain access to the employees system and steal their data. While an employee may have to use public Wi-Fi from time to time depending on circumstances, employees should deter from doing so. Employees should also use the companies VPN for an extra layer of security while using public Wi-Fi.

Employees need to be trained on using their own device for business so they do not make mistakes that could cause issues with BYOD. Ranging from email security, to network security, it is important for employees to understand how to properly use their device.

And lastly, device loss or theft. A lost or stolen device could cause a major security issue for the company. To prevent this, an encryption software that can wipe the device if unauthorized access is attempted too many times can be installed to protect the device.