View Post

Mobile Considerations in Network Security Architecture

In Cybersecurity by Ian0 Comments

This entry is part 7 of 10 in the series Intrusion Detection

This entry is part 7 of 10 in the series Intrusion DetectionThe use of mobile devices including policies and employee restrictions should be considered in any modern network security architecture. Mobile devices are used commonly both at home and at work with some organizations managing BYOD (Bring your Own Device) policies. It is therefore important to consider the implications of …