End-user Device Security

by Tom Olzak Oct. 1, 2017 via Infosecwriters

Where does your business expend most of its resources to prevent malicious code attacks? If your company is like those for which I have worked, most of the time and effort is spent on the network perimeter and servers. But what about those ubiquitous end-user devices?


Irina Alexandra Negrii 5 days, 5 hours ago

Devices range from the traditional desktop and laptops to smartphones and
tablets, with each different device exposing organisations to security risks which
are taken into account in the guidelines.