Bring Your Own Device (BYOD) to Work Bring Your Own Device (BYOD) to Work

Bring Your Own Device (BYOD) to Work

Trend Report

    • $28.99
    • $28.99

Publisher Description

Bring Your Own Device (BYOD) to Work examines the emerging BYOD (Bring Your Own Device to work) trend in corporate IT. BYOD is the practice of employees bringing personally-owned mobile devices (e.g., smartphones, tablets, laptops) to the workplace, and using those devices to access company resources such as email, file servers, and databases.

BYOD presents unique challenges in data privacy, confidentiality, security, productivity, and acceptable use that must be met proactively by information security professionals. This report provides solid background on the practice, original research on its pros and cons, and actionable recommendations for implementing a BYOD program. Successful programs are cross-functional efforts including information technology, human resources, finance, legal, security, and business operating teams. This report is a valuable resource to any security professional considering a BYOD program.

Bring Your Own Device (BYOD) to Work is a part of Elsevier's Security Executive Council Risk Management Portfolio, a collection of real world solutions and "how-to" guidelines that equip executives, practitioners, and educators with proven information for successful security and risk management programs.



- Presents research data associated with BYOD and productivity in the workplace



- Describes BYOD challenges, risks, and liabilities



- Makes recommendations for the components a clearly communicated BYOD program should contain

GENRE
Computers & Internet
RELEASED
2013
March 25
LANGUAGE
EN
English
LENGTH
20
Pages
PUBLISHER
Elsevier
SELLER
Elsevier Ltd.
SIZE
6
MB
The Benefits and Security Risks of Web-Based Applications for Business The Benefits and Security Risks of Web-Based Applications for Business
2013
Cybersecurity for Information Professionals Cybersecurity for Information Professionals
2020
Information and Cyber Security Information and Cyber Security
2020
Information Security Management Systems Information Security Management Systems
2018
Cyber Security and Privacy Cyber Security and Privacy
2014
Confronting Cyber Risk Confronting Cyber Risk
2021
Wolves of the Yukon Wolves of the Yukon
2012
Business Continuity Business Continuity
2013
Crisis Management at the Speed of the Internet Crisis Management at the Speed of the Internet
2013
Smart Partners Smart Partners
2016
Workplace Security Playbook Workplace Security Playbook
2013
Corporate Security Organizational Structure, Cost of Services and Staffing Benchmark Corporate Security Organizational Structure, Cost of Services and Staffing Benchmark
2013