Question

share your thoughts on how to mitigate the risks associated with mobile systems and BYOD. A...

share your thoughts on how to mitigate the risks associated with mobile systems and BYOD. A few items that may help to get you going:

  • Have you ever been hacked?
  • Do you use mobile banking?
  • Do you feel at risk?
  • Do you read the privacy policies you are presented with?
  • How do organizations protect their data when employees use their own mobile devices?
0 0
Add a comment Improve this question Transcribed image text
Answer #1

i)My mobile never been into hacking stuff.

ii)yes, I use mobile banking very often.It is kind of very easy and does so many transactions within seconds .Each and every time you don't need to go to bank unless it is important.

iii)No , there is no risk in mobile unless you share something which is not supposed to share with others.There might me some errors on servers side saying that the particular transaction is only work on week days.Then , that kind of transactions will be done but that takes some time when some particular transaction is done on weekend.

iv)Yes, I have read all privacy policies .These policies differ from bank to bank.But when it comes to basic properties like updating,creating and deleting account/balance/deposit/withdraw all the functionalities remains the same.

v)There are strict rules in all organizations saying that employee should not record any company related stuff in their own mobile devices.If any employee tries to get the confidential data through his personal devices, he will be punished .and apart from that serious action will be held against him for breaking the company policies.

Basically in any organization data is very powerful and confidential starting from small-size startups to very large-size organizations.When it comes to stealing of data , there will be very serious action against the victim no matter what.

Of course, this may be career risk for an employee , who wants to take out the an organization's data and information.there will be cyber crime case will be filed against victim.

Add a comment
Know the answer?
Add Answer to:
share your thoughts on how to mitigate the risks associated with mobile systems and BYOD. A...
Your Answer:

Post as a guest

Your Name:

What's your source?

Earn Coins

Coins can be redeemed for fabulous gifts.

Not the answer you're looking for? Ask your own homework help question. Our experts will answer your question WITHIN MINUTES for Free.
Similar Homework Help Questions
  • How would you train your employees to avoid risks of using mobile devices?

    How would you train your employees to avoid risks of using mobile devices?

  • First World Bank Savings and Loan has decided to deploy a bring-your-own-device (BYOD) strategy to allow its employees...

    First World Bank Savings and Loan has decided to deploy a bring-your-own-device (BYOD) strategy to allow its employees to use their personal smartphones to access the Bank's data instead of using smartphones provided by the company. The information technology (IT) department needs to manage the mobile operating system on BYOD devices to protect the confidentiality and integrity of sensitive information. You have been tasked by the Bank's CIO to report on third-party Mobile Device Management (MDM) solutions, and to make...

  • How can you stop malware from spreading across your systems? Why do you think organizations still...

    How can you stop malware from spreading across your systems? Why do you think organizations still deploy Wi-Fi across an organization? What steps can be taken to reduce the risks associated with Wi-Fi services?

  • Unit 10 Compensatiion - Topic 1 Embedded Controls, Open versus Closed Pay Systems, and Outsourcing How...

    Unit 10 Compensatiion - Topic 1 Embedded Controls, Open versus Closed Pay Systems, and Outsourcing How do embedded controls affect managerial pay decisions? Select one type of embedded control, indicating how it can help control costs. Research has shown that employees in open pay systems misperceive the actual pay system as much as employees in closed pay systems. There is also research that employees in companies with open pay policies have higher satisfaction with their pay than in organizations with...

  • I need your thoughts about this article. Pew Research recently reported that “roughly six-in-ten U.S. adults...

    I need your thoughts about this article. Pew Research recently reported that “roughly six-in-ten U.S. adults say they do not think it is possible to go through daily life without having data collected about them by companies or the government.” Andrew Hawn, my former colleague and now founder of MetaForesight, is a technology, media and content expert. Andrew has been collaborating with my analytic startup, Metametrix, and we recently spoke about privacy and its far-reaching implications. “We’re seeing a social...

  • Hello, Need my paper proof read, I have problems with my paper structure. I need help...

    Hello, Need my paper proof read, I have problems with my paper structure. I need help with my flow as I feel as if my analysis is not iter mixing with the my paper. For example currently I have citation, citation, example, then my analysis. I need help restructure my paper for better flow. I have copied and pasted my paper for review below: Smart home devices have been a growing trend in the Canadian market with approximately 18% of...

  • Overview: Now that you’re super knowledgeable about security, let's put your newfound know-how to the test....

    Overview: Now that you’re super knowledgeable about security, let's put your newfound know-how to the test. You may find yourself in a tech role someday, where you need to design and influence a culture of security within an organization. This project is your opportunity to practice these important skillsets. Assignment: In this project, you’ll create a security infrastructure design document for a fictional organization. The security services and tools you describe in the document must be able to meet the...

  • Area Act Date Description Telecommunications Telecommunications Deregulation and Competition Act of 1996—an update to Communications Act...

    Area Act Date Description Telecommunications Telecommunications Deregulation and Competition Act of 1996—an update to Communications Act of 1934 (47 USC 151 et seq.) 1934 Regulates interstate and foreign telecommunications (amended in 1996 and 2001) Civil legal evidence Federal Rules for Civil Procedure (FRCP) 1938 As updated in 2006, specifies requirements for the storage, protection, and surrender of discoverable electronic data as used in federal civil proceedings Freedom of information Freedom of Information Act (FOIA) 1966 Allows for disclosure of previously...

  • Required information Establishing Credibility as a Presenter One of your first presentation strategies should be to...

    Required information Establishing Credibility as a Presenter One of your first presentation strategies should be to establish credibility. Without appearing self-serving, find ways to increase your perceived credibility. Use the presentation to show your thorough understanding of a business issue. Frame your ideas in ways that show clear benefits to your company, its employees, and its stakeholders. In every way, display honesty and openness. During the presentation, you establish your competence by showing that you know the content well. You...

  • I need a summary and your thought about this article. Ethics In The Digital Age: Protect...

    I need a summary and your thought about this article. Ethics In The Digital Age: Protect Others' Data As You Would Your Own It has been a year since the European Union implemented its General Data Protection Regulation (GDPR), a landmark privacy law aimed at curtailing the widespread use of personal information – without the full understanding or consent of the people concerned– for monetary gain, especially by major tech companies. What seemed bold and daring in 2018 is being...

ADVERTISEMENT
Free Homework Help App
Download From Google Play
Scan Your Homework
to Get Instant Free Answers
Need Online Homework Help?
Ask a Question
Get Answers For Free
Most questions answered within 3 hours.
ADVERTISEMENT
ADVERTISEMENT
ADVERTISEMENT