Concepts
- BYOD
- CYOD
- COPE
- MDM
- MAM
- Profile Security Requirement
- NAC
- MFA
- Anti-Malware Software
- App Permission Scanner
Tips
- Ensure device does not automatically connect to networks
- Ensure device does not automatically pair other Bluetooth devices
- Use MDM software to deploy Profile Security Requirements
- User Training
- Use Wi-Fi Analyzer
- Use Cell Tower Analyzer
- Malware Detection
- Monitor undetected connections to Spoofed Cell Towers
- Do not store sensitive data on devices
- Remote Data Wipe lost devices
- Change credentials after data leak or lost device
- Restrict GPS permissions
- Restrict microphone and camera permissions