Determine what you believe to be the top three (3) physical security risks for endpoint devices. Create a list of three (3) best practices that you would follow in order to secure your devices, physically and otherwise.

Assume you are an IT Manager in charge of developing policies for your organization’s upcoming BYOD usage announcement.  Policies could include categories such as devices supported, passwords, employee use, applications, expense reimbursement, etc.  What are the top five (5) policies that you would include?  Be sure at least one (1) of the policies involves security.
Determine what you believe to be the top three (3) physical security risks for endpoint devices. Create a list of three (3) best practices that you would follow in order to secure your devices, physically and otherwise.
4
5
Imagine that you are an IT Manager and you need to create a PowerPoint for training purposes that outlines the potential threats involved in e-mail and social networking. Determine the top five (5) risks that you would cover in your presentation. Provide a rationale for your response.
Many organizations do not allow office employees on the corporate intranet to use social networking sites and instant messaging software. Take a position for or against these policies and provide a rationale for your response.

Related posts

Latest posts

Leave a Comment

Leave a Reply

Your email address will not be published.