Allowing mobile devices, including those personally owned by employees, onto the network may be inevitable, but it doesn’t mean you have to throw up your hands and abandon all hope of security. You can plan for safe deployment of mobile devices, even when those devices don’t belong to the company. Check out this article on safely enabling mobile devices, which is part of a multi-part series on planning for network security:
About The Author
Debra Littlejohn Shinder is a technology and security analyst and author specializing in identity, security and cybercrime, utilizing her past experience as a police officer and police academy/criminal justice instructor. She has written numerous books and articles for web and print publications and has been awarded the Microsoft MVP designation for fourteen years in a row.