
The Hitlist: BYOD
“Bring Your Own Device” or BYOD is becoming an ever increasing topic among CIOs and other executives. We are not here to argue the merits
“Bring Your Own Device” or BYOD is becoming an ever increasing topic among CIOs and other executives. We are not here to argue the merits
areas that may be covered in an audit Assign an audit lead internally – yearly internal audit checks, point of contact Plan a portion of your
Part 1 of our “Perimeter Network Security” Hitlist covered the virtual considerations one must consider when securing their network. Now, we will cover the things
To “completely” secure an enterprise network is a very complex, and often, nearly impossible task. There are several different factors that come into play that
Many organizations are faced with the decision to implement or to forgo corporate WiFi. There are a number of considers to think about when contemplating