25.3 – BYOD Forensics

25.3 – BYOD Forensics
Introduction to BYOD Several years ago, it was common for companies to persist in issuing mobile devices to their employees in an office. Then came the explosion in Apple iPhone, and more and more people were depending on their own devices for working purposes. That brought about the fashion in bringing your own device (BYOD). It provides employers a great advantage which enables people to connect to work and systems 24*7. But this does imply security implications which go naturally with uncontrolled information access from everywhere, especially when the devices are not under good physical security environments. In the workplace,…
To access this content, you must subscribe to this General Subscription, or log in if you are a member.

Share this post