CHAPTER SUMMARY
The existence of wireless and mobile smart devices on corporate networks presents some unique challenges to IT security professionals. When those devices are user-owned, the challenges are multiplied. Security teams must not only account for the inherent vulnerabilities of wired and mobile technologies, but must also deal with user behavior, which can be unpredictable. In addition, the increased risk associated with lost or misplaced devices far eclipses the risk associated with PCs. In response to this, IT security teams can employ processes and controls to reduce risk.
Sound planning, backed by adherence to best practices, must be balanced with the inherent need for legitimate access in support of the business. Likewise, compliance ...
Become an O’Reilly member and get unlimited access to this title plus top books and audiobooks from O’Reilly and nearly 200 top publishers, thousands of courses curated by job role, 150+ live events each month,
and much more.
Read now
Unlock full access