1 / 1100%
Bringing your device has been a part of business culture since 2008, with
its popularization coming in 2011. Companies practicing BYOD enjoy cost-
saving through having to issue fewer devices to employees. However,
with these cost savings, they sacrifice security. One of the most significant
vulnerabilities added through the introduction of this technology is in the
form of end node vulnerabilities. An example of this end node weakness
that has caused many data breaches is when a device containing
sensitive information is lost or stolen by un-trusted parties. Another
example is when employees take their devices as they leave the
company.
  It is essential to observe end-user behavior. This “assists businesses by
revealing vulnerabilities which can help detect potential internal
Students also viewed