Project 2: Cybersecurity Incident Response
CenExCorp introduced BYOD to employees four months ago and it has been a welcomed
addition. The technology has brought an increase in overall project production over the previous
year. This in itself has justified the rollout of this technology. Currently, the company is
supporting all laptop systems utilizing Mac O/S and Windows and mobile devices using Apple
IOS and Android. This happens through a central device management system that pushes a
policy based profile to the BYOD system.
There have been a few drawbacks since the rollout. There have been two separate,
yet very similar, intrusion attempts on the network through employee systems. In the first
instance, a fellow employee reported the activity through our reporting webpage. The second
instance highlighted our network monitoring software’s capabilities to detect suspicious activity.
The first instance was determined to be an attempt where a malicious user captured the
mobile devices MAC address from a local copy shop WiFi network. The attack then attempted to
access the company BYOD network by using the authorized MAC address. The system denied
the traffic, and the associated user was suspended until an investigation could be conducted. The
second instance resulted from a policy oversight. An employee’s laptop was compromised at
their home through own WiFi network. Again, the system denied the attempted breach.
These instances have shown that the current setup is ensuring a secure network
environment while allowing for productivity to thrive. The IT department will continually
reviewing policy settings against the latest software and hardware on the market. This will enable
the employees to keep their own mobile devices up-to-date with the latest security software
while still being allowed to work remotely.