ENTERPRISE MOBILITY RISKS: WHERE TO FOCUS?
FINDING A BALANCE BETWEEN INNOVATION AND INFORMATION SECURITY
This paper discusses a number of topics related to the enterprise mobility management and information assurance. It covers areas of design, implementation, and operation of Bring Your Own Device (BYOD) mobility management strategy. Information Systems Audit and Control Association (ISACA) defines BYOD, in the broadest sense, as a specialized program designed to provide device independence to end users. (Nelson, 2016) BYOD has several advantages but many organizations struggle to find a right balance between business goals and objectives, a need to innovative, and a need to manage information security risks. This whitepaper discusses several frequently overlooked BYOD pitfalls that organizations encounter; for instance: excessive reliance on technology, lack of attention to administrative controls, risk assessment issues, and issues related to BYOD support by senior leadership. In addition, the whitepaper reviews regulations and mobility management best practices, as well as provides recommendations on how to implement a successful BYOD program.
Keywords: mobile device, bring your own device, security, information assurance