Changes

Jump to navigation Jump to search
no edit summary
Line 18: Line 18:     
This page will provide some tips and tricks as well as some common risks and security issues that come along with a BYOD model.  
 
This page will provide some tips and tricks as well as some common risks and security issues that come along with a BYOD model.  
 +
 +
==Risks and Security Concerns==
 +
Personal Devices in an enterprise work environment can create security risk some of which include:
 +
 +
*Target for Social Engineering - Attackers tailor attacks towards certain individuals based on collect personal data or interests.
 +
*Data Loss and Data Leaks - Sensitive data being dispersed to people who should not have access to it or erased/destroyed all together.
 +
*Lack of Patch Management - Attackers can leverage out-of-date and flawed software to exploit and gain access to a device.
 +
*Device/Asset Loss - Theft or loss of a device which cannot be accounted for.
 +
*Weak Anti-virus or Firewall Configurations - Attackers can exploit these weak security postures to gain access to a device.
 +
 +
These are a subset of a large list of potential areas of exploitation if a device is not secured adequately.
    
|}
 
|}

Navigation menu

GCwiki