Scenario 1
Scenario 1
Applying the PDCA cycle to address the BYOD issue:Applying the PDCA cycle to
address the BYOD issue:
1. Plan:
o Objective: Ensure that the use of personal gadgets at the workplace is well
controlled to avoid any break down concerning BYOD.
o Targets: Use MDM systems, make it mandatory to have personally owned
devices conform to certain security standards, and insist on the use of VPNs
when accessing company information from offsite.
o Resources: The IT security staff to oversee the MDM systems, software
applications for VPN connection and device tracking, and training of employees
on proper use of their owned devices.
2. Do: Policies that should be implemented include; making it mandatory for
employees to install MDM software, strict password policies on the devices, and
encryption of all company data on personal devices.
3. Check: Finally, assess the outcomes of the MDM and VPN policies that have
been put in place. Check for any new breaches or attempted attacks through
personal devices and also collect feedback from the employees regarding the
new security measures implemented.
4. Act: According to the review, make the necessary changes. If employees are
having a problem with VPN because of connectivity, then consider other options
such as the Zero Trust security frameworks. Make sure the MDM policies are
updated from time to time as the threats are evolving.