Health IT Security
Health IT Security Bring your own device (BYOD) has become the routine in most organizations as employers seek creative ways to increase the flexibility and productivity of workers. However, although BYOD creates numerous benefits for employees and organizations, the practice introduces various security risks. These risks relate to data leakage or loss and unauthorized data access. First, personal mobile devices are highly susceptible to attacks and eavesdropping. These risks result from the failure to update the device’s operating system, antivirus, security patches and applications regularly. Therefore, the confidential information sent using such devices could be intercepted and decrypted easily. Furthermore, a hacker can easily install a malicious application in the unsecured phone and use the application to sniff, alter or steal confidential information (Garba, Armarego, Murray & Kenworthy, 2015). Secondly, phones, tablets and laptops get lost or stolen easily. Consequently, sensitive information is lost or compromised. Thirdly, third parties such as spouses, siblings and friends can access one’s mobile device easily. The inappropriate use of the device by the third parties introduces the risks of security breaches, accidental or intention deleting of confidential information and installation of malicious applications.
An individual can implement several measures to address the security issues associated with BYOD. First, I would implement various procedures to secure my device. The procedures would include the installation of MAM, EMM and DLP software (Keyes, 2016). Furthermore, I would ensure to update my device’s operating systems, security patches, browsers, applications and antivirus software regularly. Secondly, according to Mottl (2015), I would engage in ongoing research on the current and emerging BYOD security threats and the effective strategies that I can apply to prevent potential threats within and outside the workplace.
References
Garba, A. B., Armarego, J., Murray, D., & Kenworthy, W. (2015). Review of the Information
Security and Privacy Challenges in Bring Your Own Device (BYOD) Environments.
Journal of Information Privacy and Security, 11(1), 38-54.
doi:10.1080/15536548.2015.1010985.
Keyes, J. (2016). Bring Your Own Devices (BYOD) Survival Guide. Boca Raton: CRC Press.
Mottl, J. (2015). How to ensure BYOD doesn’t put health data at risk. Retrieved from
Struggling with paper writing? Look no further, as you have found the ideal paper writing company! We are a reputable essay writing service that offers high-quality papers at affordable prices. On our user-friendly website, you can request a wide range of assignments. Rest assured that our work is entirely original. Each essay is crafted from scratch, tailored to meet the precise requirements of your assignment. We guarantee that it will successfully pass any plagiarism check.
Get Your Assignments Completed by Expert Writers. Hire Essay Helpers for Any Task
Order essays, term papers, research papers, reaction paper, research proposal, capstone project, discussion, projects, case study, speech/presentation, article, article critique, coursework, book report/review, movie review, annotated bibliography, or another assignment without having to worry about its originality – we offer 100% original content written completely from scratch

