Monday, April 1, 2019
Bring Your Own Device System: Pros and Cons
Bring Your Own Device schema Pros and Cons parry of Contents (Jump to) penetrationAdvantage of using BYODRisks of using a BYOD SystemHow to build a Secure BYOD policy1. Carry protrude a survey2. How does employees practice session their device on the co prevail vaneSuggested BYOD Policy access Control/ Acceptable UseRoles and responsibilitiesDevices and Support auspicesTermination of employmentISO standards to equalBenefits of using ISO 27002Reference disceptationBibliographyIntroductionCalathumpian Group is facing a major education integrity issue, the chief operating officer is concern just about the way cooperate information ar treated. The c totallyer-up is allows BYOD (Bring Your Own Device) establishment which means that employees offer using up their personal laptops , smartphones or tablets on the black marketplace for their daily workload and to bring together to the corporate mesh (Webopedia.com 2015).Advantage of using BYODMaximise gelt by reducing force- out ironw ar saluteThe purpose of all brass section is to maximise profit while minimising expenses, BYOD allows minimum-zero technology cost since there is no purchase cost for employees working device and aid cost for the devices.Improve employees performanceBYOD improves employees performance and efficiency at work as by allowing them to use their personal devices with which they use also for recreational or home purpose, they true automatism that increase their productivity. Tasks and operations are completed faster (Workforce 2014).Reduce computer hardware alienationBYOD processs to keep employees favourable in their working environment, since they know how to operate with their work devices. For example for a new employee, its better to work with a device he/she knows than cooperate devices as they ply move over to be trained.Risks of using a BYOD SystemSoftware incompatibilityEmployees working on different versions of OS or software tools can practice information being not accessible or shared. This is not in force(p) and restrict information access.DistractionsEmployees usually have their favourite apps, games or serial publication rescue on their laptops or smartphones, these entertainment may distract employees during their working hours thus reducing their performance. For example employees checking their Facebook account every 20 minutes. guarantor security is the major problem with BYOD systems, as it puts all your cooperate data in risk. As all employees leave behind certainly use their devices away(p) the workplace, if they are infected by a virus or targeted by a hacker and connect to the cooperate network, the whole network leave alone be moved(p) and important data may be corrupted, stolen or deleted.How to build a Secure BYOD policy1. Carry out a surveyI order to build an effective BYOD policy, we have to abridgment what type of devices are being use on the cooperate network. A survey make by the Forresters Forrsights W orkforce Employee shows that smartphones and tablets are among the just about use device on the workplace, the laptop being the most utilise device, as illustrated on the image 1, (InfoSec Institute 2013).2. How does employees use their device on the cooperate networkWe have to analyse what processes are done by employees on the network, this testament enables the BYOD policy to match the business operations. For example be they using skype to connect foreign suppliers, what software industrys are being used, what unstable application is using the WIFI system to operate. This analysis provide help to developed acceptance criteria and limitations for the BYOD policy.Suggested BYOD PolicyIn order to illuminate the positioning Calathumpian Group is facing we will developed a BYOD Policy that can be implemented in the organisations system. The report will contain policy about acceptance use, User responsibilities, Cooperate IT Responsibilities, Devices and Support, concealment Policy and warrantor Policy, we will keep the report simple and smooth to understand in order to make the implementation of the Policy system better.Calathumpians employees must agree to the representing policies in order to connect their devices to the cooperate network. If they fail to abide to the policies the company reserves the right to disconnectedness them to the network and press further charges. These policies are implemented for the well-running of the organisation by enforcing security and harbor cooperate data.The template of Megan Berry (2015) will be used to develop the BYOD policy, it is simple and very comprehensive template (Itmanagerdaily.com 2015).Access Control/ Acceptable UseActivities that are productive to the business are con rampred as acceptable.Certain websites will be blocked on the network for the employees during working hours, scarcely onwards and after the working hours that these websites will be accessible. This will encourage employees to be on time. Such websites relates toSocial Networks (Facebook, Twitter, Instagram, Google +, etc) television system Games tie in websiteBetting websitePornographicTorrentsStreaming websitesThe network will only allow a limited amount of software tool to use internet or allowed connection to the network, this will decrease the risks of propagating viruses on former(a) connected devices.Mobile apps that are allowed on the network are emails , messaging apps ( much(prenominal) as WhatsApp , Viber , Messaging , Skype) , system updatesMobile apps that are blocked includes iTunes , Google scarper , Apps Store , Mobile Games and Social networking appsRoles and responsibilitiesDividing responsibilities in the company helps to maintain a certain hierarchy and determine how should do what and when. In order to solve the problem Calathumpian Group is facing, roles and responsibilities must be implemented so that the employees knows what are expected from them. In this case a structured IT section is needed.IT gage ManagerSince the CEO of the Group might not be comfortable with IT department due to his age, it is better to choose some who is qualified for this job. The IT Security manager will be in charge for the creation and maintenance of the BYOD policy. This involves the risk management, security management and enforcing the BYOD policy.Human resource managerThe HR manager will be responsible for the comprehension of the BYOD policy within the company. His job is to ensure that the employees understand their commitment.IT departmentThis department will provide help for the employees regarding the BYOD policy. For example when an employee terminate his contract with the company, the IT department is responsible for the ablation of sensible information regarding the company. They are also responsible for the implementation of hardware policies such as block websites and some mobile application, antivirus configuration (Auto regard on power on), maintenance of the network and other processes. tout ensemble employeesAll employees must abide to the set of rules and regulations present in the BYOD policy, not respecting it will cause sanctions from the organisation as they are putting the companys information at risks.Devices and SupportMobile operating system such as IPhone (4, 4S, 5, 6), Android devices (KitKat and Lollipop), Blackberry and Windows phone are allowed only.Android tablets and IPad are allowedThe IT department is not responsible for any device software or hardware failureThe IT department has the right to take the mac comprehend of every device connected to the network, for security purpose. The mac address will help the IT department to apply certain restriction to specific employeesSecurityTo prevent unauthorised access to devices, employees must use strong passwords to protect their devices. A strong passwords is categories asHaving at least 8 characters confederacy of lower and upper case letterMust include at least two digitsCannot contain symbolsEmployees must change their passwords every 60 weeksEvery time an employee leave his work place, he/she must mechanically lock his/her device to prevent unauthorised access.Employees must encrypt their information such as emails , documents and other filesEmployee must hand over their devices to the IT department in order to connect to the networkTermination of employmentIn order to prevent cooperate information to be accessible when an employee leaves the organisation for a particular reason, the later must present the device used on the network for inspection. The IT department will be responsible for that (Shrm.org 2015), they will delete all company related data on the device.ISO standards to followA standard is a document that provides lookments, specifications, guidelines or characteristics that can be used consistently to ensure that materials, products, processes and services are fit for their purpose. We create over 19500 International Standard s that can be purchased from the ISO store or from our members Tools and techniques (Iso.org 2015)In this case the ISO standard that best suit the problem of Calathumpian Group is the ISO/IEC 27002, which stress on information security management. This standards helps to maintain information such as employee details, cooperate financial report or other cooperate related information.Benefits of using ISO 27002Risk managementFind potential riskHelps to authorize themSecurity policiesInformation security managementResource managementHR securityPhysical securityCommunications managementAccess l spike heelnIncident response management (SearchSecurity.co.UK 2015)Tools and TechniquesIncident ResponseReference listInfoSec Institute,. 2013. Importance Of A BYOD Policy For Companies Infosec Institute.http//resources.infosecinstitute.com/byod-policy-for-companies/.Itmanagerdaily.com,. 2015. BYOD Policy Template.http//www.itmanagerdaily.com/byod-policy-template/.SearchSecurity.co.UK,. 2015. What Is ISO 27001? Definition From Whatis.Com.http//searchsecurity.techtarget.co.uk/definition/ISO-27001.Shrm.org,. 2015. electronic Devices Bring Your Own Device (BYOD) Policy.http//www.shrm.org/templatestools/samples/policies/ rogues/bringyourowndevicepolicy.aspx.Webopedia.com,. 2015. What Is Bring Your Own Device (BYOD)? Webopedia.http//www.webopedia.com/ precondition/B/BYOD.html.Workforce, The. 2014. The Pros And Cons Of Bring-Your-Own-Device (BYOD) For A Mobile FieldWorkforce MSI Data. MSI Data. http//www.msidata.com/pros-and-cons-of-byod-in-mobile-field-workforce.Bibliography1 foliateSensoneural Hearing Loss Features of PatientsSensoneural Hearing Loss Features of PatientsPermanent slanted and bilateral assymetrical sensorineural hearing loss Clinical, vestibular, audiological and radiological evaluation.AbstractThe aim of this get wind was to evaluate the clinical, vestibular, audiological and radiological features of diligents with immutable unilateral and assymet rical sensoneural hearing loss (SNHL). square and methods Twenty eight patients with either permanent unilateral and noninterchangeable bilateral SNHL,diagonosed by means of pure tone audiometry(PTA) have been submitted to clinical,vestibular, audiological and radiological evaluation.Results chalk up twenty eight patients with male female ratio of 2.11 were analysed. 22 (78.57%)patients had unilateral and 6(21.43%)patients had bilateral asymmetrical SNHL.Right left ratio in cases of unilateral SNHLwas 0.831. twain tinnitus and vertigo was present in 12(42.95%)patients and negligent in 10 (35.8%)patients.On otoscopy tympanic membrane was intact in all cases.PTA showed profound loss in majority of cases.Tone spoil was done in11 patients and was normal in all cases.Cold large calorie was done in 27 patients and was absent in 7(25.9%)patients , hypoactive in 8(29.6%)patients.MRI canvass was done in 9 patients. pop of 9,7 were normal and rest two showed irresponsible findings.Con clusion Proper clinical, vestibular and audiological work up is important before radiological investigation is sought to increase diagonostic pay and cost lastingness in unilateral, bilateral (asymmetrical)SNHL.INTRODUCTIONAlthough a commonly encountered diagnosis by otolaryngolist, unilateral SNHL represents a difficult clinical entity for the specialist. Whereas the diagnosis is easily obtained by PTA, diagonosis of cause and treatment represents the complexity of this clinical situation. Further complicating work up is the evergrowing cost for laboratory and radiological studies(1).Reiss M (1994) carried out hire for derivative instrument diagnosis of unilateral hearing loss(2).Hendrix RA(1990) carried out study on asymmetrical sensoneural hearing loss.(3).Asymetrical hearing loss is the difference of more than 10 db averaged over the frequencies 0.5,1,2 and 4Khz or 20 db or more at any single frequency(4).A recent study has suggested a rule 3000 where in asymmetry of 15 db o r more at 3000Hz require a MRI. If less than 15 db, a biannual audiometric follow up is sufficient(13).In present study, we present clinical, vestibular ,audiological and radiological features of patients with either permanent unilateral SNHL or asymmetrical hearing loss.MATERIAL AND METHODSThis future study was conducted in the department of Otorhinolaryngology,government medical college,Srinagar,Kashmir on 28 patients, consisting both paediatric and adult patients from December 2013 to May 2014.After taking history about hearing loss and associated symptoms, otoscopy and PTA, patients were subjected to audiological and vestibular evaluation. Radiological investigation(MRI) was done in selected pigeonholing of patients because of financial and other reasons. bring up distribution, laterality, audiological, vestibular and radiological findings are presented in tables1-6.RESULTSA total of 28 patients were included in present study. Out of 28 patients,19 were males and 9 were femal es with male to female ratio of 2.11.(table 1).Involvement of left ear was more common than right and 6 patients (21.42%) had bilateral asymmetrical loss(table2).Vertigo and tinnitus was associated symptoms in 12 patients(42.95) and 10patients(35.8%) presented with hearing without associated symptoms(table3).Tone decompose test was normal in all tested patients.(table4).Cold calorie test was hypo- active in 8 patients(29.6%) and absent in 7 patients(25.9%)(table5).Radiological findings were normal in 7 out of 9 patients(table6).DISSCUSSIONWe describe 28 patients of unilateral and asymmetrical SNHL which were clinically ,audiologically and radiologically evaluated. Male prevalence was observed in the present study which is consistent to other study.(5). In studies by Cadoni G etal(2005) and Stefano Berrettini(2013), both have female preponderance which is in contrast to present study(6,7). In present study,left ear was more affected as compared to right which is in consistant to stu dy done by Stefano Berrettini(2013).(7).In our study tinnitus is present in 14 patients(50.09%) and vertigo is present in 16 patients(59.3%). Study done by Stefano Berrettini showed tinnitus was present in 87% and vertigo in 44% cases(7). In present study, Tone fall apart test(TDT) was done in 11 patients.TDT was not done inpatients having profound SNHL. In all patients in which TDT was done ,results were normal. P.L.Bhatia (1969) etal in his study used TDT for diagonosis of retro cochlear pathology(8). It helps in diagonosing neural lesions quite accurately(9).In our study vestibular function test (cold calorie test) was done in all patients except one.CCT was absent(no response) in 7 patients(25.9%) and hypoactive in 8 patients(29.6%).Stafano Berrettini etal used calorie stimulation test in his study(7). Although the findings of decreased vestibular function on calorie exam in ipsilateral side to a SNHL historically has been usefull in suggesting the diagonosis of vestibular sch wannoma. But at present ,it is not sensitive enough tobe helpful diagonostically for vestibular schwannoma because a pocket-sized inferior vestibular nerve schwannoma might not cause an unnatural calorie response(10).Hypoactivity of the affected side is seen in meineres disease(11).In present study,patients having hypoactive calorie test or absent calorie test or in whom tone decay test could not be done due to profound hearing loss were subjected to radiological investigation(MRI).One patient on MRI showed micro haemorrhages in left peritrigonal area and other patient on MRI showed vestibular schwannoma.MRI is now the recommended investigation for diagonosis of retrocochlear pathology.(2,12).MRI scanning with Gagolinium will identify virtually all tumours and was considered to be gold standard(14).Recently T2-weighted fast whirl echo MRI has been found to be sensitive and less valuable than gadolinium enhanced standard MRI(15).CONCLUSIONClinical ,audiological and vestibular test ing is important in diagonostic workup of unilateral and asymmetric hearing before radiological investigation is done to decrease economic burden and to increase diagonostic yield from definite radiological investigations.REFERENCES1.Jacques Peltier.Grand rounds presentation,UTMB,Dept. of Otolaryngology Nov10,2004.2.Reiss M,Reiss G. Differential diagonosis of unilateral hearing loss.Praxis .2000.Feb 389(6)241-247.3.Hendrix R A,De Dio RM,Scalajani AP.The use of diagonostic testing in asymmetrical SNHL. Otolaryngol Head get it on Surgery.1990 oct103(4)593-8.4. David M Baguley.Age related SNHL.Chapter238 a.Scott Browns vol 3 seventh Edition.5.Prognostic factors of sudden SNHL in diabetic patients.Diabetes care October 2004 vol.27 no10 2560-1.6.Cadoni G etal.Sudden SNHLOur experience in diagonosis, treatment and outcome.J.Otolaryngol.2005 Dec34(6)395-401.7.Stefano B.etal.Analysis of 3-D(FLAIR) time in Idiopathic SSNHL.JAMA Otolaryngol head and neck surgery vol 139(no.5)May 2013.8.P.L. Bhatia.A Sinha. Tone decay test A simple and reliable audiological test.Laryngoscope vol79 issue 11 page no 1879-90.Nov 1969.9.Anirban Biswass.Tone decay test. Clinical and vestibulometry.Fourth Edition.10. Glasscock-Shambauugh.Surgery of the ear.Chapter 32.Fifth Edition.11.Abir K Bhattacharya, Jabin thaj. Investigation protocol for SNHL. Otorhinolaryngology Clinics An foreign Journal,may-aug 20102(2)107-11212.Mahillon V. Diagonostic management of unilateral SNHL in adults.Rev med Brux 2003 Feb24(1) 15-1913.Saliba I, Martineau G,Chagnon M.Asymmetric hearing loss Rule 3000 for binding vestibular schwannoma. Otol Neurotol 2009 jun 30(4) 515-52114.Fergusion etal. Efficiency of tests used to screen cp angle tumours A prospective study.Br J Audiol 1996,jun 30(30)159-7615. Shelton C. etal. Fast spin echo MRI Clinical application in screening for acoustic neuroma. Otolaryngol Head neck surgery 1996114(1)71-76 sidestep1 Sex distribution of patients (n=28)Table 2 Laterality of involved ear of patients (n=28)Table 3 Associated symptoms with hearing loss (n=28)Table 4 Tone decay test of patients (n=11)Table 5 Cold Calorie test of patients (n=27)Table 6 Radiological (MRI) findings of patients (n=9)
Subscribe to:
Post Comments (Atom)
No comments:
Post a Comment