March 2026
Intermediate to advanced
400 pages
15h 45m
English
Several risk-mitigation methods can be applied to mobile devices and Wi-Fi clients to address the wide variety of threats discussed in the previous section. Typically, the worst-case scenario is a lost or stolen device that is completely vulnerable. The practices for protecting data on corporate-liable devices involve encryption, wiping lost devices, and remote locking. These practices are also necessary when employee-owned devices are allowed to access and download company data. Therefore, they should be considered mandatory when developing a BYOD or corporate owned personally enabled (COPE) strategy.
The key methods to consider are as follows:
Read now
Unlock full access