Create your policy before procuring technology - find the


I have to review this article in APA format. When it comes to the whole new generation of Internet of Things (IoT)[1], expansive wireless community is 'blowing up' with connectivity.

As a company continues in the 21st Century it also has to evolve with the growing technology to even compete.

The concepts of bring your own device (BYOD)[2] comes to a different level. There was article produced by IBM on this same topic and it is titled 'The Ten Commandments of Bring Your Own Device (BYOD)[3]'.

The commandments are the following:

1. Create your policy before procuring technology

2. Find the devices that are accessing corporate resources

3. Enrollment should be simple

4. Configure your devices over-the-air

5. Help your users help themselves

6. Keep personal information private

7. Keep personal information separate from corporate data

8. Manage data usage

9. Continually monitor devices for noncompliance

10. Enjoy the return on investment (ROI) from BYOD When looking at these it seems quite simple in some ways but that is far from the truth. These BYODs come in all shapes and sizes.

The crafting of these polices need to be priority and look at the current data market to decide which devices will be authorized and what levels of security needs to be adjusted.

This also comes in play when crafting the policies and if they mirror a foundational structure that is laid out in the 'GUIDELINES FOR MANAGING THE SECURITY OF MOBILE DEVICES IN THE ENTERPRISE' from NIST[4].

The overall objective is to support the CIA Model[5]. Once this is achieved then the proper mobile device management (MDM)[6]. As a manager, it is all about planning and research.

I understand that many companies will rush into this technology and just by an MDM off the shelf and turn it on. That is not the proper approach to take by any means. With any build, it takes time, plans and research. Just like building a home, if the foundation is weak the structure will not stand the test of time.

As stated in Isaiah 28:16 - Therefore thus says the Lord GOD, "Behold, I am laying in Zion a stone, a tested stone, A costly cornerstone for the foundation, firmly placed.

He who believes in it will not be disturbed.[7] This holds true even in today's security world.

Solution Preview :

Prepared by a verified Expert
Computer Engineering: Create your policy before procuring technology - find the
Reference No:- TGS02408688

Now Priced at $10 (50% Discount)

Recommended (96%)

Rated (4.8/5)