March 2021
Intermediate to advanced
400 pages
14h 24m
English
The existence of wireless and mobile smart devices on corporate networks presents some unique challenges to IT security professionals. When those devices are user-owned, the challenges are multiplied. Security teams must not only account for the inherent vulnerabilities of wired and mobile technologies, but must also deal with user behavior, which can be unpredictable. In addition, the increased risk associated with lost or misplaced devices far eclipses the risk associated with PCs. In response to this, IT security teams can employ processes and controls to reduce risk.
Sound planning backed by adherence to best practices must be balanced with the inherent need for legitimate access in support of the business. Likewise, compliance ...