The paper discusses BYOD aspects: Pros and cons, an overview of all kinds, the apps problem, potential attack vectors on BYOD and data leakage through, advice and implementing a device management model. Integrating Mobile Device Management (MDM) inside corporate IT management protocols is a must.
- US
- About ESET
- Newsroom
- Press Releases
- BYOD: (B)rought (Y)our (O)wn (D)estruction?