Email this article   Print article 


6 Steps To Address BYOD: A Security Management Roadmap

By Robert Westervelt CRN
4:00 PM ET Mon. Mar. 18, 2013
1 | 2 | 3 | 4 | 5 | ... 7 | Next >

BYOD Timeline Begins With Assessment, Policy Creation

Managed security service provider Solutionary created a BYOD timeline in its 2013 Threat Report. Failing to address BYOD is one of 5 costly security weaknesses, according to the firm's report. The firm's timeline begins with policy creation, includes user education, policy enforcement and deploying some form of mobile antivirus. A policy to force data encryption and remote wipe capabilities should also be implemented, the firm said. The SANs institute, a security research and education organization, provides mobile security policy templates for further guidance.

Next Slide >

1 | 2 | 3 | 4 | 5 | ... 7 | Next >


CHANNEL SERVICES >>


ccsa