Changes

Jump to navigation Jump to search
no edit summary
Line 11: Line 11:  
|-
 
|-
 
| style="backgound:#2e73b6;width:1000px;text-align:left;weight:normal;" scope="col" |
 
| style="backgound:#2e73b6;width:1000px;text-align:left;weight:normal;" scope="col" |
 +
 +
==Background==
 +
With the increase in BYOD (Bring Your Own Device) and remote working, it is important to be mindful of what and how devices are used to conduct business activities. Each type of device be it a router, smartphone, laptop or tablet can be used to remote work which if not properly secured, become a target for compromise.
 +
 +
 +
 +
This page will provide some tips and tricks as well as some common risks and security issues that come along with a BYOD model.
 +
     

Navigation menu

GCwiki