BYOD – A comparison of BYOD security policies – What is BYOD?



BYOD – A comparison of BYOD security policies – What is BYOD?

0 0


byodTalk

Presentation on BYOD and security policies in organizations using reveal.js

On Github tylerablake / byodTalk

BYOD

A comparison of BYOD security policies

Created by Tyler Blake Devin Clapp

Agenda

  • Overview of project
  • What is BYOD?
  • Advantages/Disadvantages
  • DevCo
  • TyCo
  • Comparison
  • Ideal Solution

What is BYOD?

  • Bring Your Own Device
  • Policy of allowing employees to bring personal devices to work

Advantages

&

Disadvantages

Advantages

  • Increased productivity
  • Improved morale
  • Makes the job look more flexible and attractive
  • Cost savings for the company

Disadvantages

  • Increased chance of data breaches
  • Employee forgetting to wipe memory when reselling devices
  • Employee losing devices with confidential work data on them
  • Harder to monitor usage
  • Scalability issues for company infrastructure

Overview of Project

  • Compare and contrast BYOD policies in 2 different settings
  • Discuss the security policies related to BYOD for each
  • Assess the risks each company endures
  • Determine how they manage/handle such risks

DevCo

Overview

  • Healthcare Firm
  • Provides medical assistance and insurance to their customers

BYOD Policy

  • Strict as they are a covered entity
  • VPN portal allowed from any device
  • Guest wireless offered for personal devices

Risks

  • HIPAA, they must remain compliant with regulations
  • Data theft/leaks
  • Lost or stolen devices

Risk Management

  • Physical access controls limit access to certain areas
  • Logical access controls limit access to data and assets
  • User ID with role based permissions
  • Cheaper for healthcare industries to provide devices than suffer financial penalties from an attack

TyCo

Overview

  • IT consulting firm
  • Provides cloud based solutions for many different organizations

BYOD Policy

  • Relaxed poicy
  • All devices are allowed
  • Login to access company network and assets
  • No VPN requirement for remote access
  • No monitoring software required
  • No prohibited applications

Risks

  • HIPAA compliance when working with covered entities
  • Malicious code planted in project solutions
  • Compromise of login to client system/network
  • Compromise of login to their own system/network
  • Device gets lost/stolen

Risk Management

  • Physical access controls to certain company assets
  • Logical access controls
  • Login with authentication/authorization
  • Role-based access controls
  • Group based access controls
  • Transfer risks to their cloud service provider
  • Transfer risks to the client they are working for

Comparison

  • DevCo
  • Strict policy
  • Only authorized personal devices in limited contexts
  • Requires login to access guest network
  • Must use VPN for romote acess
  • TyCo
  • Relaxed policy
  • All personal devices are allowed
  • Requires login to access internal network
  • No VPN required for remote access

Ideal Solution

  • Only allow certain devices (ex. laptops only)
  • Login for acess to company network
  • Must use VPN for remote access
  • Use of monitoring software on devices
  • Requirement of anti-virus/malware software installed
  • Train employees on acceptable use of devices
  • Set up an employee exit strategy

Questions?

Thank you! :) Presentation brought to you via Reveal.js!