|
The purpose of the BYOD Acceptable Use Policy is to define standards, procedures, and restrictions for end users who are connecting a personally owned device to a company’s...
|
|
|
Having the ability to remote wipe is one of the most basic tools in IT's arsenal for securing mobile devices. Use this remote wipe waiver template to create a document that...
|
|
|
The mobile device reimbursement policy will outline the devices and voice/data plans that qualify for corporate reimbursement and the limits of corporate reimbursement of...
|
|
|
Advancements in consumer technology can catch you off guard if you are not properly prepared. Evaluate emerging consumer technologies annually, and start managing consumer...
|
|
|
The influx of consumer devices has brought along a variety of potential security risks through the consumer applications that end users have on their devices. Hamilton...
|
|
|
This video introduces the key driver of personal and unmanaged applications (PUAs) and the potential long term application portfolio strategy to integrate these into the...
|
|
|
Mobile devices compromise biosecurity and information security. Use management of biosecurity risks as both a carrot and stick to enhance hospital IT security compliance.
|
|