IT Examiner School, Seaside, CA
What is a good BYOD Strategy? People – security awareness training, constant education, instill in the culture Process – monitoring, enrollment/de-provisioning, quarantine, application lifecycle Policy – acceptable use policy, e-mail security, access control, password policy, patch management, incident response, business continuity Technology – NAC, MDM, MAM, firewalls, IDS/IPS, A/V How many of you have A/V on your Mobiles?
BYOD Conclusion
Mobile devices keep us informed and productive. They also have transformed into full-blown computers. As enterprises and employees begin to store critical data on mobile devices, security is vital and fundamental to our overall IT security posture. BYOD does not have to mean “Bring Your Own Disaster/Danger.”
Made with FlippingBook - Online catalogs