Bring-Your-Own-Device (BYOD) and associated policies, like Corporate Owned, Personally-Enabled (COPE), can create growing pains for some organizations. As a cybersecurity manager for iT-Master — an organization that has just given its employees the option to use their own devices, you have already run into a number of security issues and requests that you need to help resolve. Some current issues are as follows:
- The iT-Master CISO wants to install enterprise software that tightly sandboxes enterprise mobile apps and prevents data loss.
- The iT-Master network administration team is clamoring for tighter controls on the types of apps mobile users are authorized use.
- The iT-Master CISO is requesting a baseline of mobile-user behavior to address some concerns regarding the company's assets.
- The iT-Master CIO and CTO want specific mobile phone functions restricted in and out of the company building.
- The iT-Master finance and accounting teams have expressed concerns about data confidentiality.
- The iT-Master sales division wants help in keeping mobile devices secure during travel.
As a manager, you will now decide on the actions needed to resolve mobile phone issues that have arisen in your workforce.
To return this interactive to its initial state, click Reset.
© iT-Master Cybersecurity Training