6 Steps To Address BYOD: A Security Management Roadmap

BYOD Timeline Begins With Assessment, Policy Creation

Managed security service provider Solutionary created a BYOD timeline in its 2013 Threat Report. Failing to address BYOD is one of 5 costly security weaknesses, according to the firm's report. The firm's timeline begins with policy creation, includes user education, policy enforcement and deploying some form of mobile antivirus. A policy to force data encryption and remote wipe capabilities should also be implemented, the firm said. The SANs institute, a security research and education organization, provides mobile security policy templates for further guidance.

Get a roundup of CRN's security coverage right to your inbox with the Security Advisor newsletter.