An organization has instituted a bring-your-own-device (BYOD) work environment. Which of the following policies best addresses the increased risk to the organization’s network incurred by this environment?
A.
Limit the use of the employee devices for personal use to mitigate the risk of exposure to organizational data
B.
Ensure that relevant access to key applications is strictly controlled through an approval and review process
C.
Institute detection and authentication controls for all devices used for network connectivity and data storage
D.
Use management software to scan and then prompt patch reminders when devices connect to the network
[Reference: IIA Business Knowledge for Internal Auditing, BYOD Security Controls section., , , , ]
Contribute your Thoughts:
Chosen Answer:
This is a voting comment (?). You can switch to a simple comment. It is better to Upvote an existing comment if you don't have anything to add.
Submit