top of page

Protect Yourself by Protecting Others

I could not agree more with this article.  One of the best ways to an end user’s heart is through their personal content.  Teach security fundamentals at a personal device level and those behaviors will carry over to the work place.  Also, remember the value of MDM (Mobile Device Management) when it comes to BYOD (Bring Your Own Device) programs.  End device encryption is key.  Also, consider the fact that many employees will try very hard to use their personal devices regardless of policy, so a strong MDM can have value with or without a formal BYOD strategy.

1 view

Recent Posts

See All

Rethinking Software in the Organizational Hierarchy

I very much enjoyed this article from Pieter Danhieux via Dark Reading and this creative approach to the management of applications and hierarchical security. The concept of least privilege and the d


bottom of page