Your company is thinking of introducing a Bring Your Own Device (BYOD) policy. You have been tasked with assessing the risks associated with this implementation, including how to manage malware, data leakage, and access control.
Research threats and vulnerabilities by mobile and other devices introduced to networks through BYOD policies.
Discuss the following:
- What risks do these devices pose?
- How do you manage BYODs in a secure way to prevent malware, data leakage, and control access?