Mobile device security | CMGT430 Enterprise Security | University of Phoenix
Mobile device security | CMGT430 Enterprise Security | University of Phoenix
Respond to the following in a minimum of 175 words:
Mobile devices are used by employees throughout the day, whether it is placing calls, accessing company files and databases, or sending instant messages to coworkers and clients. Mobile devices also present significant security risks. Discuss the advantages, disadvantages, and security risks for 2 types of mobile device enterprise policy, such as company-owned, business only (COBO) or company-owned, personally enabled (COPE). Suggest ways to mitigate the security risks you identify.
Mobile device security | CMGT430 Enterprise Security | University of Phoenix
Respond to the following in a minimum of 175 words:
Mobile devices are used by employees throughout the day, whether it is placing calls, accessing company files and databases, or sending instant messages to coworkers and clients. Mobile devices also present significant security risks. Discuss the advantages, disadvantages, and security risks for 2 types of mobile device enterprise policy, such as company-owned, business only (COBO) or company-owned, personally enabled (COPE). Suggest ways to mitigate the security risks you identify.