BYOD by Arnab Kumar Saha

16
BRING YOUR OWN DEVICE (BYOD) By Arnab Kumar Saha Cyber Security Space

Transcript of BYOD by Arnab Kumar Saha

Page 1: BYOD by Arnab Kumar Saha

BRING YOUR OWN DEVICE (BYOD)

By Arnab Kumar Saha Cyber Security Space

Page 2: BYOD by Arnab Kumar Saha

What is BYOD?

It’s a policy of permitting employees to use personally owned mobile devices to their workplace to access privileged company information and applications.

Page 3: BYOD by Arnab Kumar Saha

Why It is So Important?

2014 20180

2

4

6

8

10

12

14

Mobile Devices in the World

Mobile Device in Billions

Axis Title

Mob

ile D

evic

es in

Bill

ions

• 12.1 Billion Devices For 7.56 Billion People in 2018 with 1.6 Device Per Head.• Employees Want to Use

Their Own Devices.• Increase Productivity at

a Large Scale as They Are Familiar With Their Own Devices.

Page 4: BYOD by Arnab Kumar Saha

What Survey Says?

Own Device User

(75%)

Orga-niza-tion

Device User(2

5%)

Own Device User Percentage

Own Device User Organization Device User

In High Growth Markets Such as Russia , Brazil

Page 5: BYOD by Arnab Kumar Saha

What Survey Says?

44%

Job Seekers’ View

Series1

44% Job Seekers View an Organization More Positively if it SupportsTheir Device.

Page 6: BYOD by Arnab Kumar Saha

Problems of BYOD

Main Problem of BYOD is With The Most Valuable Thing Of Company……….

DATA

How? Let’s See……

Page 7: BYOD by Arnab Kumar Saha

Lost and Stolen DevicesApproximately 22% of the total number of mobile devices produced will be lost or stolen during their lifetime, and over 50% of these will never be recovered.

Page 8: BYOD by Arnab Kumar Saha

Using Encryption

Using Encryption is One Of The Most Scientific and Best Way to Protect Your Data. It works Even After Stealing The Data.

Page 9: BYOD by Arnab Kumar Saha

Malware Download

Free Software From Unknown Website May Contain Customized Malware Which Can be Undetected By Best Antiviruses. It’s Better to Use Original One.

Page 10: BYOD by Arnab Kumar Saha

Using AntiVirus & AntiMalware

Using A Good and Updated Antivirus Gives Basic Protection and Protects Us From General, Old & Uncustomized Malware.

Page 11: BYOD by Arnab Kumar Saha

Unknown App Download

Millions of Fishy Mobile Apps Take Unnecessary Access Permission and

Misuse It.

Page 12: BYOD by Arnab Kumar Saha

Insecure Public Network

Use of Insecure Pubic Network Such As Free WiFi May Help Hackers to Steal Your Data. Its Better Not to Connect Laptop Which Contains Secret Data of Company.

Page 13: BYOD by Arnab Kumar Saha

Security Features Of Operating System

Our Windows, Linux & Mac Contains a Lots of Security Feature Among Which Only 30% is Activated By Default

Page 14: BYOD by Arnab Kumar Saha

Enabling Firewall

Enabling All The Security Features Manually, Will Protect Us From Malicious Data Or Attacks Performed By Hacker.

Page 15: BYOD by Arnab Kumar Saha

Most Important: Cyber Security Education

The main and most important step is spreading cyber security education among the employees and awareness about securities. Most of the people are careless about security and they don’t know the basic things about security.

Page 16: BYOD by Arnab Kumar Saha

Thank You