View Post

Mobile Considerations in Network Security Architecture

In Cybersecurity by Ian CarnaghanLeave a Comment

This entry is part 7 of 10 in the series Intrusion Detection

The use of mobile devices including policies and employee restrictions should be considered in any modern network security architecture. Mobile devices are used commonly both at home and at work with some organizations managing BYOD (Bring your Own Device) policies. It is therefore important to consider the implications of this and to ensure any BYOD device is properly locked down, …