• To ensure you get the most out of your CIN membership and stay connected with the latest updates, we are asking all members to update their community profiles. Please take a few moments to log in and: • Complete all sections of your profile • Review your current information for accuracy • Enter an alternative email address if desired (CIN requires your valid business email address for your training organization). Keeping your profile up to date helps us better serve you, ensures your account is correctly linked with CompTIA’s CRM, streamlines processes, enhances communication, and guarantees you never miss out on valuable CIN opportunities. Thank you for taking this important step! step!

BYOD vs Cybersecurity Policies

Trevor Chandler

Well-known member
Jul 4, 2020
678
629
24,221
Can BYOD policies be compatible with good cybersecurity? It depends!!!!!
Oh, my bad: BYOD (Bring Yo Own Device)

The rise of remote work has brought a flood of BYO-devices, whether they’re
company-approved or just sneak in.

The question is: should IT and security pros embrace BYOD or try to ban it?

The answer depends on a wide range of factors!! One thing is for certain,
whichever policy you choose, you must be able to enforce it. The inmates
MUST NOT be allowed to run the place of confinement!!!
 
  • Love
Reactions: precious