1 00:00:06,500 --> 00:00:09,430 - [Omar] Let's go over what is BYOD, right? 2 00:00:09,430 --> 00:00:13,817 So BYOD stands for bring your own device. 3 00:00:15,930 --> 00:00:17,837 And basically what it is is actually, 4 00:00:17,837 --> 00:00:20,024 it's the ability to give your employees 5 00:00:20,024 --> 00:00:23,030 to be able to actually work from anywhere 6 00:00:23,030 --> 00:00:24,540 and work with anything, right? 7 00:00:24,540 --> 00:00:28,600 So they can bring their own laptop, 8 00:00:28,600 --> 00:00:32,050 or your own tablet, mobile device, and everything, 9 00:00:32,050 --> 00:00:33,400 and be more productive, right? 10 00:00:33,400 --> 00:00:37,290 So this also reduce the cost of an organization 11 00:00:37,290 --> 00:00:39,340 of actually providing those devices 12 00:00:39,340 --> 00:00:41,219 and managing those devices, right? 13 00:00:41,219 --> 00:00:45,020 So many organizations have actually reduced the cost 14 00:00:45,020 --> 00:00:49,280 of operations by actually allowing the employees 15 00:00:49,280 --> 00:00:51,070 to be able to actually bring their tablet, right, 16 00:00:51,070 --> 00:00:54,070 to a meeting room, and then be more productive, right? 17 00:00:54,070 --> 00:00:57,110 Also increases collaboration among people, right? 18 00:00:57,110 --> 00:01:00,510 So, again, this is actually something that perhaps, 19 00:01:00,510 --> 00:01:02,572 you know, not a lot of companies are actually going back 20 00:01:02,572 --> 00:01:05,110 and restricting that access. 21 00:01:05,110 --> 00:01:06,910 You know, it all depends on your environment 22 00:01:06,910 --> 00:01:07,980 and your corporate policy, right? 23 00:01:07,980 --> 00:01:09,910 But that's one of the things, actually, 24 00:01:09,910 --> 00:01:12,653 we have been seeing for the last, you know, decade or so 25 00:01:12,653 --> 00:01:15,384 of more companies actually allowing their users 26 00:01:15,384 --> 00:01:17,460 to bring their own device. 27 00:01:17,460 --> 00:01:21,190 Now that, of course, increase the risk of, you know, 28 00:01:21,190 --> 00:01:23,907 security, your security risk, and your security posture. 29 00:01:23,907 --> 00:01:24,740 Why? 30 00:01:24,740 --> 00:01:27,680 Because that tablet, or that phone, you know, 31 00:01:27,680 --> 00:01:31,290 may actually have malware that may infect other systems, 32 00:01:31,290 --> 00:01:33,740 let's say a server in your data center, 33 00:01:33,740 --> 00:01:35,870 or actually other users, right, 34 00:01:35,870 --> 00:01:39,070 that are using desktop machines that, perhaps, 35 00:01:39,070 --> 00:01:41,730 you're actually, you know, managing in your network, right? 36 00:01:41,730 --> 00:01:44,460 So we actually gonna be covering what is MDM 37 00:01:44,460 --> 00:01:48,285 in a a different lesson, mobile device management, right? 38 00:01:48,285 --> 00:01:51,363 But you know this is actually one of the main predicaments 39 00:01:51,363 --> 00:01:53,890 of cybersecurity nowadays 40 00:01:53,890 --> 00:01:57,120 of actually allowing employees actually bringing 41 00:01:57,120 --> 00:01:59,680 those devices that perhaps actually they don't go 42 00:01:59,680 --> 00:02:01,280 and patch those devices. 43 00:02:01,280 --> 00:02:03,230 So there's a lot of solutions, of course, 44 00:02:03,230 --> 00:02:05,740 in the industry to help mitigate that risk. 45 00:02:05,740 --> 00:02:09,153 But it's definitely a risk nowadays in any corporation.